143
Global Geo-Political Crisis: Emerging Technologies A Topic Proposal for the National Federation of High Schools Topic Selection Committee Submitted May 12, 2021 Updated June 24, 2021 Luke Brinker-Lev Tel-Aviv, Former Debater, Topeka HS, KS Peter Crevoiserat Wichita Northwest HS, KS 0

old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Global Geo-Political Crisis:  Emerging Technologies

A Topic Proposal for theNational Federation of High Schools Topic Selection Committee

Submitted

May 12, 2021

Updated

June 24, 2021

Luke Brinker-LevTel-Aviv, Former Debater, Topeka HS, KS

Peter CrevoiseratWichita Northwest HS, KS

Michael HarrisWichita Southeast HS, KS

Pam McComas

0

Page 2: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Retired, Director of Forensics, Topeka HS, KS

1

Page 3: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Table of Contents

I.   Introduction ......................................................................................................................2

II.   Resolutions ......................................................................................................................26

III.   Definitions .......................................................................................................................27

IV.   Timeliness .......................................................................................................................41

V.  Scope ..............................................................................................................................42

VI. Range...............................................................................................................................42

VII. Quality .............................................................................................................................66

VIII. Material............................................................................................................................66

IX. Balance.............................................................................................................................67

X. Interest..............................................................................................................................68

XI. Possible Affirmative Cases and Negative Positions........................................................69

XII. References........................................................................................................................71

2

Page 4: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Global Geo-Political Crisis:  Emerging Technologies

“Never let a good crisis go to waste!”-- Sir Winston Churchill“Crisis and opportunity”

President Joseph R. Biden, Jr.100 Day Address, April 28, 2021

I.   Introduction

As the world awaits Daniel Craig’s next and final film as 007 (No Time to Die), everyone

is excited for the next crisis facing this enigmatic character and Q’s new gadgets to be unveiled

to determine the best opportunity to de-escalate the situation(s).  Throughout Ian Fleming’s long

time Bond series of fictional thrillers and espionage, the author would immerse the reader into a

sci-fi glimpse of new tech for the main character to utilize in overcoming numerous threats to the

United Kingdom or the world.   

However, today’s world is facing a global geo-political crisis with emerging

technologies.  Technologies, such as artificial intelligence, biotechnology, and cybersecurity are

not fiction, but real and impose perilous situations to all nations.  Just like Bond facing endless

conflicts, in President Biden’s 100-day speech, he speaks about “crisis and opportunity”

(“Biden’s Speech to Congress: Full Transcript,” The New York Times.com).  Bond and Biden

are of the same mindset: “turning peril into possibility, crisis into opportunity, setbacks to

strength” (“Biden’s Speech to Congress: Full Transcript,” The New York Times.com).

Foremost among the crises confronting the U.S. and the world is the threat posed to liberal

democracy by disinformation, attempts to dismantle core institutions, and social conflict --

phenomena that have been exacerbated by the weaponization of emerging technologies. As

Rachel Ellehuus and Pierre Morcos of the Center for Strategic and International Studies argue,

3

Page 5: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

now is the time for NATO to be “ambitious” in meeting this challenge and to serve as a bulwark

for democratic values.

Ellehuus, Rachel (Deputy Director, Europe, Russia, and Eurasia Program) and Morcos, Pierre (Visiting Fellow, Europe, Russia, and Eurasia Program), “‘Lifting Up Our Values at Home’: How to Revitalize NATO’s Political Cohesion,” Center for Strategic and International Studies, March 12, 2021, accessed online June 18, 2021. https://www.csis.org/analysis/lifting-our-values-home-how-revitalize-natos-political-cohesion 

First, an inattention to the principles of democracy, individual liberty, and the rule of law in a member country creates societal vulnerabilities that competitors can exploit. Russia, for example, preys on the grievances of racial and ethnic minorities in NATO member countries in order to weaken national-level governance and cohesion. Likewise, a compromised media environment allows disinformation campaigns to flourish, while corruption opens space for Russian networks to operate and gain influence. Even allies with strong democratic institutions, such as Germany, are increasingly targets of Russian disinformation campaigns. In these ways, a deficit in internal values quickly becomes an external security threat.

....

Yet however difficult, NATO can no longer afford to turn a blind eye on these internal strains. From its founding, it has been more than just a military alliance. NATO has embraced a political role built on a shared democratic identity. As the alliance seeks to exercise more fully the power of this political dimension, shoring up its values is vital to realizing the full benefits of collective security. A lack of response from NATO on these issues would ultimately undermine its reputation and credibility, most notably toward accession candidates and partners.

With NATO in the midst of an adaptation process and a new U.S. administration committed to defending democratic values and restoring the transatlantic alliance, the time is right for tackling this issue. Washington has the political sway to act as a “first among equals” within NATO and push allies to seriously address this challenge. However, a mere declaration of good intentions is not enough. If allies want to uplift NATO’s political cohesion, they will need to be ambitious.

As James Bond would often partner with Felix Leiter, CIA operative, to conquer these

challenges, the U.S. must now have a global partnership to successfully overcome various threat

levels to resolve crises.  This is why the authors contend a U.S. and NATO cooperative offers the

best geopolitical defense against formidable threats, such as China and Russia.

4

Page 6: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Clearly, the last four years created a geopolitical climate that makes cooperation a more

cumbersome sell for Biden. But, with Trump’s eye on 2024, now may be the time for Biden to

act decisively to partner with international groups as a way of proving their legitimacy, thus

making the case for international engagement rather than isolationism. While current terrorist

threats appear from domestic origins and gun violence, AI, biotechnology, and cybersecurity

may pose a more dangerous threat to the United States and its allies which requires an

international solution.  

With experts predicting that whichever country leads in emerging technology by 2030

will be the dominant power for the remainder of this century, the time to counter the threat posed

by authoritarian powers like China and Russia is running short.

Gill, Indermit (Nonresident Senior Fellow, Global Economy and Development, Brookings Institution), “Whoever leads in artificial intelligence in 2030 will rule the world until 2100,” The Brookings Institution, January 17, 2020, online accessed 06/08/2021, https://www.brookings.edu/blog/future-development/2020/01/17/whoever- leads-in-artificial-intelligence-in-2030-will-rule-the-world-until-2100/

A couple of years ago, Vladimir Putin warned Russians that the country that led in technologies using artificial intelligence will dominate the globe. He was right to be worried. Russia is now a minor player, and the race seems now to be mainly between the United States and China. But don’t count out the European Union just yet; the EU is still a fifth of the world economy, and it has underappreciated strengths. Technological leadership will require big digital investments, rapid business process innovation, and efficient tax and transfer systems. China appears to have the edge in the first, the U.S. in the second, and Western Europe in the third. One out of three won’t do, and even two out three will not be enough; whoever does all three best will dominate the rest.

We are on the cusp of colossal changes. But you don’t have to take Mr. Putin’s word for it, nor mine. This is what Erik Brynjolfsson, director of the MIT Initiative on the Digital Economy and a serious student of the effects of digital technologies, says:

“This is a moment of choice and opportunity. It could be the best 10 years ahead of us that we have ever had in human history or one of the worst, because we have more power than we have ever had before.”

5

Page 7: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Why should the U.S. partner with NATO?  As Brynjolfsson notes, this is indeed “a

moment of choice and opportunity,” and given that the 2020s will be decisive in determining

which global powers lead the world in emerging technologies for foreseeable future, now is the

time -- with a sufficient but rapidly shrinking window of opportunity -- to debate NATO as the

appropriate mechanism for cementing the transatlantic alliance’s technological and geopolitical

leadership, lest China and Russia gain supremacy. Just like the CIA, NATO is in a unique

position to create an innovation pipeline to maintain security worldwide.  Rob Murray, the head

of NATO innovation unit, contends in the NATO Review, September 1, 2020, NATO is key in

building the framework for emerging technology.

Murray, Rob (head of the Innovation Unit, NATO’s Emerging Security Challenges Division). “Building a Resilient Innovation Pipeline for the Alliance.” NATO Review, 1 Sept. 2020, accessed online, February 15, 2021.www.nato.int/docu/review/articles/2020/09/01/building-a-resilient-innovation-pipeline-for-the-alliance/index.html .  Today, NATO’s competition is a global one and the race is one of technological adoption – that is, the acceptance, integration and use of new technology in society. From artificial intelligence to quantum and everything in between, governments are in a race to leverage these technologies at scale and speed – the first adopter advantage for emerging disruptive tech could not be more prevalent in the world of geopolitics and deterrence. Indeed, the nations that win this race may be those with the most agile bureaucracy rather those with the best technology. In contrast to the Cold War, the United States and its NATO Allies are unlikely to simply outspend others . In a post-Covid-19 world, rebalancing public finances could see further financial pressure placed on Allied defence budgets. We now need a different advantage, one which will deliver in the short term and build resilience over the longer term – more defence at less cost with least delay. This starts with our people, their creativity, education and access to funding. It ends with a robust pipeline of new dual-use (civil and military) technologies constantly being created, commercialised and capitalised upon.The Alliance’s transatlantic nature places it in a unique position within the international order to provide both demand-side policies and supply-side resources that can genuinely build such a pipeline, creating not only innovations but entirely new markets – as Eisenhower noted: the foundation of military strength is economic strength. Recent history would suggest, the model of democracy and Allied governments’ willingness to make big bets on mission-oriented technology does indeed create new markets and it is this model, underpinned by shared values, which will be key to NATO’s longer term success.

But what about now? In the short term, NATO innovation needs to lay the foundations for Allies to realize those benefits of an Alliance-wide approach.

6

Page 8: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Answers may lay in focusing on two core areas: [1] addressing the fragmentation of researchers, academia, start-ups and government at the beginning of this pipeline – that is, managing uncertainty. [2] being able to adopt and scale these new technologies as and when they are ready – meaning the necessity of nimble, agile investment and acquisition entities across both public and private sectors, all of which need to be equally incentivized to take significant levels of risk.These activities are difficult in their own right but combining them into an Alliance innovation pipeline, while attempting to make use of the comparative advantage each Ally brings to the table, leaves the Alliance with a “wicked problem”. It is wicked because it demands a combination of both sustained and disruptive innovation (which seeks to radically change the status-quo) occurring simultaneously across NATO.

In addition, European leaders now view this as a critical time to develop the types of alliances

that were not possible under the previous administration:

Erlanger, Steven (chief diplomatic correspondent) and Michael D. Shear (White House correspondent),  “Shifting Focus, NATO Views China as a Global Security Challenge,” The New York Times, June 14, 2021, accessed online June 24, 2021, https://www.nytimes.com/2021/06/14/world/europe/biden-nato-china-russia.html 

New challenges from cyberwarfare, artificial intelligence and disinformation, as well as new missile and warhead technologies, must be considered to preserve deterrence, the alliance said. And Article 5 of its founding treaty — an attack on one is an attack on all — will be “clarified” to include threats to satellites in space and coordinated cyberattacks.

This NATO meeting was mostly a warm embrace of President Biden, who in contrast to his predecessor has expressed deep belief in the alliance and in the importance of American participation in the multilateral institutions Washington established after the horrors of World War II.The contrast to Mr. Trump’s May 2017 NATO summit was remarked on by many other leaders. Then, Mr. Trump was particularly angered by the expense and lavish use of glass in NATO’s new $1.2 billion headquarters. Mr. Trump also defied the expectations of even his own aides and refused to announce support for NATO’s Article 5, a central tenet of collective defense.

Mr. Biden quickly declared Monday that the alliance is “critically important for U.S. interests” and called Article 5 a “sacred obligation.” He added: “I just want all of Europe to know that the United States is there.”

Prime Minister Mario Draghi of Italy spoke for many when he connected this summit with the Group of 7 summit meeting just concluded in Britain and compared them unfavorably with the period of Mr. Trump. “This summit is part of the process of reaffirming, rebuilding the fundamental alliances of the United States,” which were “weakened by the previous administration,” Mr. Draghi said.

7

Page 9: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

With a new administration taking the reins, now could be the key opportunity of moving

forward with international partnerships, particularly in the area of emerging technologies. On

February, 2021, at the Munich Security Conference, President Biden argues,

We must shape the rules that will govern the advance of technology and the norms of behavior in cyberspace, artificial intelligence, biotechnology so that they are used to lift people up, not used to pin them down.  We must stand up for the democratic values that make it possible for us to accomplish any of this, pushing back against those who would monopolize and normalize repression.

In a recent Brookings Institute report, Lindsey Ford, a David M. Rubenstein Fellow, and James

Goldgeier, a Senior Visiting Fellow in Foreign Policy, contend,

Ford, Lindsey W. (David M. Rubenstein Fellow-Foreign Policy, Ctr. For East Asia Policy Studies) and James Goldgeier (Sr. Visiting Fellow-Foreign Policy, Ctr on US and Europe), “Retooling America’s Alliances to Manage the China Challenge.” The Brookings Institute, Jan. 25, 2021, online accessed 02/15/2021, https://www.brookings.edu/research/retooling-americas-alliances-to-manage-the-china-challenge/

The first step in creating more capable 21st century alliances is to return to basics: focusing on the defense of allied sovereignty. While allies can and should play important roles addressing violent extremism in the Middle East or engaging in partner capacity-building efforts in Africa, the principal focus of U.S. alliances in Europe and Asia should be to maintain a credible deterrence and self-defense capability. This will require greater investments by U.S. allies in their own defense, but it will also require a greater willingness in Washington to allow allies to take the lead in their own regions.Despite Europe’s continued dependence on the United States, it is time for a reconceptualization of the trans-Atlantic relationship. NATO’s continuation after the end of the Cold War was a way of keeping America in charge of European security during an uncertain period after the Soviet collapse. Europe’s failure to stop genocide in the former Yugoslavia in the early 1990s was another reminder of the continent’s dependence on Washington, which finally put an end to the killings. Moving forward, NATO’s success should be measured by its ability to shift from serving as a vehicle for U.S. dominance over European security to an entity that enables the U.S. to assist European-led defense efforts in a more balanced partnership. In October 2020, German Minister of Defense Annegret Kramp-Karrenbauer spoke of Germany’s continued dependence on the U.S. for nuclear deterrence, but declared that her country’s defense budget would continue to rise despite pressures caused by the pandemic. She argued it was time for Germany, and Europe, to do more: “We Europeans will have to do ourselves much of what America has largely done for us so far, by diplomatic and

8

Page 10: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

by conventional military means. Securing NATO’s eastern flank. Crisis management operations in our immediate neighborhood outside of Europe. Air and sea surveillance… We stay dependent, but at the same time, we must come into our own.”If the U.S. is going to succeed in rebalancing its defense posture toward Asia, it needs a stronger Europe able to take the lead in its broader neighborhood. Fears that European efforts to build greater capacity will undermine NATO are overblown and only relevant in a world in which U.S. dominance over European security — rather than the capacity of European allies to manage their own security challenges with less reliance on the United States — is the primary goal.The U.S. needs to continue encouraging its allies to move out of a supporting role in the Indo-Pacific as well. In light of the rapidly advancing military threat from both China and North Korea, U.S. allies will need to play a larger role in not only their own self-defense, but also in the region. An increasing tempo of allied air and maritime presence operations will be particularly valuable in the coming decade as the United States looks to address needed modernization requirements that may reduce its bandwidth for steady state operations. If the U.S. wants to “shift” the defense burden and credibly deter Beijing, it should also explore new ways to make it easier for U.S. allies to obtain the capabilities they need. This should include breaking down outdated bureaucratic hurdles, export control rules, and technology transfer restrictions that can make it difficult for U.S. allies to compete more effectively with Beijing. Equally important, many of these restrictions often incentivize U.S. allies to pursue autonomous capabilities outside of the alliance, rather than in tandem with Washington.Finally, focusing on domestic resilience in space, cyberspace, and technological systems will create additional incentives for allies to work together. The threat China poses in these arenas as it seeks to take the lead in 5G and artificial intelligence (AI) is becoming more apparent to allies in Asia and Europe: this is one area that can foster greater consensus despite allied disagreement on the political and economic challenges that Beijing poses. 

To be sure, NATO has already signaled its willingness to act on the threat posed by emerging

technology. At the alliance’s June 2021 summit, member states agreed to launch a defense

innovation accelerator and to increase NATO’s advisory role on cybersecurity.

Tucker, Patrick (technology editor), “NATO Members Agree to Broad Tech Agenda, Environmental Agenda,” Defense One, June 16, 2021, accessed online June 18, 2021. https://www.defenseone.com/threats/2021/06/nato-members-agree-broad-tech-agenda-environmental-agenda/174767/ 

NATO members will determine the best way to identify and minimize cyber threats, as they always have, but the members agreed to a more active advisory role for NATO. They also agreed to start the process of sharing more information with each other about the status of their resilience efforts. 

“There is a political commitment to develop this whole process, so to create...a system for monitoring, to come together regularly with high-level officials from all countries to monitor progress and then, of course, on the basis of these objectives…each ally will work with us advising to develop their own national approach. It’s an expansion.”

9

Page 11: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

NATO members will launch a defense innovation accelerator to help fund startups develop technology that could help collective defense.  

“Concretely, this will be a center designed to foster greater transatlantic cooperation, to promote interoperability and that will have a series of...offices to staff centers across the alliance,” she said. The accelerator will allow NATO to better “experiment, validate, integrate, [and] adopt new and emerging technologies, together.”

Members have also agreed to launch a defense innovation fund focused on startups that make technology for both defense and civilian organizations. The fund will be opt-in and will look for new, non-traditional players making technologies “that answer problems we have for our common defense and security,” Berti said, describing it as a recognition that the next generation of companies making defense products will largely be software companies.

But, while NATO’s pledges to increase technology cooperation are a step in the right direction,

defense scholars including Jamie Shea and Michael John Williams contend that this is just the

beginning, and in “a world full of competition for attention,” more will need to be done to

confront the emerging technology crisis head-on.

Shea, Jamie (president at the Centre for War Studies at the University of Southern Denmark and a former NATO deputy assistant secretary general for emerging security challenges) and Williams, Michael John (nonresident senior fellow with the Scowcroft Center’s Transatlantic Security Initiative and an associate professor of international affairs at Syracuse University), “The secret to NATO’s survival: Get political,” Atlantic Council, June 17, 2021, accessed online June 18, 2021. https://www.atlanticcouncil.org/blogs/new-atlanticist/the-secret-to-natos-survival-get-political/ 

As Americans memorialized their dead and sat down for barbecues with family and friends over Memorial Day weekend, little did they know that one of the country’s largest meat producers was being hacked with ransomware. The matter hit home again when summer travel plans were upended for thousands as the Steamship Authority in Massachusetts succumbed to a cyberattack. Such attacks against public and private entities will only become more common, and NATO needs to be the forum where transatlantic strategy on tech sovereignty and innovation occurs. What norms and standards are required for a stable and productive future? The focus needs to be not just on disruptive technologies (and resilience, see above), but also on how to open US and European defense markets to foster multinational cooperation in research and development and to develop industry partnerships. The announcements in the summit communiqué on establishing a Defence Innovation Accelerator for the North Atlantic and a NATO Innovation Fund are welcome developments, but more is

10

Page 12: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

needed. NATO needs to be the forum where a doctrine of cyber responsibility is developed and deployed.

Developing the Alliance as a political actor via these six action points will not be easy, but if there is an administration that could do it, it is Joe Biden’s. Biden is the first US president since George H.W. Bush with an inherent tendency toward Atlanticism. Since 2000, the transatlantic space has endured reproach, apathy, and most recently hostility and neglect from the White House, all of which have been highly detrimental to transatlantic relations and greatly contributed to the decline of NATO as a political actor. But Biden is a natural trans-Atlanticist and is the last president of a generation that looked instinctively to Europe. One of his chief legacies could be setting a foundation for younger Americans to see Europeans, in a world full of competition for attention, as the allies they turn to first.

Artificial Intelligence (AI)

In the 65 years since computer scientist, John McCarthy, coined the term “artificial

intelligence,” AI has alternately captivated, enthralled, inspired, confused, terrified, and troubled

scientists, philosophers, political commentators, and the public.  In fact, global Bond enthusiasts

are even using AI to predict the next actor to be 007.

Depending on one’s vantage point, AI may represent an opportunity to either hope for a

future in which human beings are liberated from mundane jobs and tasks and free to pursue their

own creative and leisurely interests, or an existential threat to livelihoods and the dignity of work

for all, but a narrow technocratic elite. It may be an enabler of unprecedented efficiency, or yet

another tool for flattening, and thereby impoverishing the human experience. One could see AI

as a promising pathway to smarter, more data-driven, less biased decision-making, or simply a

hi-tech means of replicating deeply ingrained societal biases, but with even less accountability.

Where some see a resource for building smarter cities and safer streets, others fear that AI will

serve as a weapon for making the modern surveillance state even more intrusive.  Whereas many

AI enthusiasts hail the technology as a way of facilitating connections among people with shared

values, interests, and ideas, more skeptical minds may consider the technology a leading culprit

11

Page 13: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

behind the Balkanization of 21st-century social and political life. For every champion of AI as a

solution for making modern warfare more precise, with fewer civilian casualties, there are likely

just as many who worry AI may be a precursor to killer robots.

Extensive as this list is, it is by no means exhaustive. AI encompasses a broad range of

applications and use cases; indeed, it is a term that “refers to any human-like intelligence

exhibited by a computer, robot, or other machine. In popular usage, artificial intelligence refers

to the ability of a computer or machine to mimic the capabilities of the human mind” (IBM). AI

systems rely on data inputs to generate insights that can then be wielded by human beings to

make decisions.  For instance, AI can be utilized to forecast electoral outcomes based on diverse

inputs like social media sentiment analysis, demographic and economic conditions, polling data,

and so on (Wiggers, 2020).    

AI can be as simple and mundane as the auto-fill that predicts and suggests words and

phrases for our text messages and email communications (usually with uncanny accuracy, based

on an extensive, data-driven understanding of online communication). It can be as complicated

and controversial as the algorithms that some experts suggest will help guide foreign policy

decision-making in the years to come (Choi, 2019). 

To the extent that AI provokes unease and debate, it is less because of what people think

of AI as a “concept” and has much more to do with what people think of specific applications of

the technology. And, when it comes to the role AI will play in international affairs and security,

there is ample room for contention.

While AI may not be at the forefront of most international affairs discussions, it is

already a prominent factor in one of the central animating realities of global geopolitics: the great

12

Page 14: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

power competition, verging on a global crisis, between the United States and the People’s

Republic of China.

For all that President Joe Biden has done to roll back key elements of former President

Donald Trump’s domestic and foreign policies, the 46th president and his administration have

signaled that they will continue his predecessor’s tough line against China (Lee, 2021). The

bipartisan consensus that China is, at best, a strategic competitor stems in large part from a clear-

eyed assessment of the country’s vast geostrategic ambitions, which has led many to the

conclusion that the U.S. was misguided in its turn-of-the-century gamble that liberalizing

economic and trade relations with China would foster greater political liberalization in the

country and encourage “peace and security” on the global stage (Clinton, 2000). 

Evidence against former President Clinton’s assessment can be found from China’s

actions in the South China Sea, its close ties with adversarial regimes like Iran and North Korea,

and its alleged theft of intellectual property. In the realm of AI, President Xi Jinping has been

clear that he sees Chinese supremacy as a core foreign policy and national security objective and

has formulated a strategy for Chinese predominance in the field by 2030.

Allison, Graham (Professor of Government at Harvard University's John F. Kennedy School of Government), and Eric Schmidt (Chair of the US National Security Commission on Artificial Intelligence. “Is China Beating the U.S. to AI Supremacy?” Harvard Kennedy School, Belfer Center for Science and International Affairs, August 2020. https://www.belfercenter.org/publication/china-beating-us-ai-supremacy

Kai-Fu Lee’s book AI Superpowers offers an insightful summary of China’s engagement in the field. It began with President Xi Jinping’s personal reaction to the defeat of the world’s Go champion. Declaring that this was a technology in which China had to lead, he set specific targets for 2020 and 2025 that put China on a path to dominance over AI technology and related applications by 2030.12 Recognizing that this would have to be led by entrepreneurial companies rather than agencies of government, he designated five companies to become China’s national champions: Baidu, Alibaba, Tencent, iFlytek and SenseTime.13 Twelve months after Xi’s directive, investments in Chinese AI startups had topped investments in American AI startups.14 By 2018, China filed 2.5 times more patents

13

Page 15: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

in AI technologies than the United States.15 And this year China is graduating three times as many computer scientists as the United States.

Then, President Trump sought to assert U.S. leadership in the field with a 2019 executive order

establishing the American AI initiative.

“The National Intelligence Research and Development Strategic Plan: 2019 Update.” Select Committee of Artificial Intelligence of the National Science & Technology Council, June 2019.   https://www.nitrd.gov/pubs/National-AI-RD-Strategy-2019.pdf

On February 11, 2019, the President signed Executive Order 13859, Maintaining American Leadership in Artificial Intelligence. 7 This order launched the American AI Initiative, a concerted effort to promote and protect AI technology and innovation in the United States. The Initiative implements a whole-of-government strategy in collaboration and engagement with the private sector, academia, the public, and like-minded international partners. Among other actions, key directives in the Initiative call for Federal agencies to prioritize AI R&D investments, enhance access to high-quality cyberinfrastructure and data, ensure that the Nation leads in the development of technical standards for AI, and provide education and training opportunities to prepare the American workforce for the new era of AI.

But, critics suggest Trump’s executive order fell short of what would be needed to promote U.S.

AI leadership.

Metz, Cade (technology correspondent). “Trump Signs Executive Order Promoting Artificial Intelligence.” The New York Times, February 11, 2019. https://www.nytimes.com/2019/02/11/business/ai-artificial-intelligence-trump.html

President Trump signed an executive order Monday meant to spur the development and regulation of artificial intelligence, technology that many experts believe will define the future of everything from consumer products to health care to warfare.

A.I. experts across industry, academia and government have long called on the Trump administration to make the development of artificial intelligence a major priority . Last spring, worried that the United States was not keeping pace with China and other countries, Jim Mattis, then the defense secretary, sent a memo to the White House imploring the president to create a national strategy on A.I.

Now, Mr. Trump has taken that step, though this “American A.I. Initiative” might not be as bold as some had hoped.

The executive order aimed to better educate workers in the field, improve access to the cloud computing services and data needed to build A.I. systems, and promote cooperation with foreign powers. But the order did not set aside funds for A.I.

14

Page 16: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

research and development, and the administration provided few details on how it planned [to] put its new policies into effect.

The Biden administration plans to continue the previous administration’s efforts to counter

China’s AI ambitions and may take additional steps, including on U.S. manufacturing policy, to

escalate the competition.

Hao, Karen (senior AI reporter at MIT Technology Review).“The Biden administration’s AI plans: what we might expect.” Technology Review,  January 22, 2021, https://www.technologyreview.com/2021/01/22/1016652/biden-administration-ai-plans-what-to-expect/ 

Finally, Biden’s new secretary of state made clear that technology will still be an important geopolitical force. During his Senate confirmation hearing, Antony Blinken remarked that there is “an increasing divide between techno democracies and techno autocracies. Whether techno democracies or techno autocracies are the ones who get to define how tech is used…will go a long way toward shaping the next decades.” As pointed out by Politico, this most clearly is an allusion to China, and the idea that the US is in a race with the country to develop emerging technologies like AI and 5G. OneZero’s Dave Gershgorn reported in 2019 that this had become a rallying cry at the Pentagon. Speaking at an AI conference in Washington, Trump’s Secretary of Defense Mark Esper, framed the technological race “in dramatic terms,” wrote Gershgorn: “A future of global authoritarianism or global democracy.”

Blinken’s comments suggest to me that the Biden administration will likely continue this thread from the Trump administration. That means it may continue putting export controls on sensitive AI technologies and placing bans on Chinese tech giants to do business with American entities. It’s possible the administration may also invest more in building up the US’s high-tech manufacturing capabilities in an attempt to disentangle its AI chip supply chain from China.

At stake in the AI competition is much more than bragging rights. Economic leadership and

global security hang in the balance.

Levine, Steve (Future Editor at Axios. I am a Senior Fellow at The Atlantic Council, and teach energy security at Georgetown University). “The stakes for who wins the AI race,” Axios.  March 21, 2018. https://www.axios.com/the-stakes-for-who-wins-the-ai-race-0363d9cd-0d97-4a5a-9ee6-36a7fb03ff44.html

Robert Work, a former deputy secretary of defense in the Obama Administration, tells Axios that that dichotomy — the difference between democratic and authoritarian systems — mean that "how we use AI will be different."In September, for instance, Vladimir Putin said that whoever leads AI "will become the ruler of the world.” Given Putin's effort to "attack the cohesion of democratic

15

Page 17: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

countries" the last two years, if he did have sophisticated AI, he "would be able to probe divisions of the entire society," Work said. "Russia looks at this as 'active measures,'" meaning as part of its longstanding system of clandestine attack on other countries.Russia is behind in AI research but ahead on robotic warfare, said Work, who is a board member at Govini, an analytics firm.With China, the AI race is likelier to have an economic texture, said Andrew Moore, dean of computer science at Carnegie Mellon University. "It will be the economic question of who will be the Googles, Amazons and Apples in 2030. There is a good chance they are more likely to come out of China than the U.S.," Moore tells Axios.

The main reason is human capital: Moore estimates that China produces ten times the number of university graduates specializing in AI as the U.S. 

While China is the United States’ primary geopolitical rival in AI, Russia has substantially

increased its strategic initiatives in AI in recent years, particularly in the commercial realm.

Markotkin, Nikolai (expert with the Russian International Affairs Council),and Elena Chernenko, (journalist with Kommersant newspaper). “Developing Artificial Intelligence in Russia: Objectives and Reality.” Carnegie Moscow Center, Aug. 5, 2020. https://carnegie.ru/commentary/82422 

Russia’s leaders have been paying close attention to artificial intelligence (AI) technologies for several years now. President Vladimir Putin has said on numerous occasions that the leader in the field of AI would become “the master of the world.” Until recently, however, Russia remained virtually the only large country without its own AI development strategy.

That changed in October 2019, when the country adopted a long-discussed National Strategy for the Development of Artificial Intelligence Through 2030. One of the driving forces behind the strategy was Sberbank president German Gref. The state-owned bank has also developed a road map for developing AI in Russia and coordinated the creation of Russia’s AI development strategy, which is largely corporate, involving the internet giants Yandex and Mail.ru Group, along with Gazprom Neft energy company.

Russian businesses are willing to put AI technology into practice, giving Russia a competitive advantage. Microsoft has named Russia the world leader in the active implementation of AI in business. According to its research, 30 percent of Russian companies actively implement AI: the highest number among all countries studied, compared with an average of 22.3 percent.

16

Page 18: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Recognizing that AI’s role in international security will only grow more prominent in the coming

years, NATO aims to develop a set of common AI standards by the summer of 2021. The precise

form these standards will take remains to be seen, but they may provide a useful framework for

new policy development.

Heikkila, Melissa (POLITICO Europe’s AI Correspondent). “NATO wants to set AI standards. If only its members agreed on the basics,” Politico. Mar. 29, 2021, https://www.politico.eu/article/nato-ai-artificial-intelligence-standards-priorities/ 

On paper, NATO is the ideal organization to go about setting standards for military applications of artificial intelligence. But the widely divergent priorities and budgets of its 30 members could get in the way. The Western military alliance has identified artificial intelligence as a key technology needed to maintain an edge over adversaries, and it wants to lead the way in establishing common ground rules for its use.   “We need each other more than ever. No country alone or no continent alone can compete in this era of great power competition,” NATO Deputy Secretary-General Mircea Geoană, the alliance’s second in command, said in an interview with POLITICO. The standard-setting effort comes as China is pressing ahead with AI applications in the military largely free of democratic oversight. David van Weel, NATO’s assistant secretary general for emerging security challenges, said Beijing's lack of concern with the tech's ethical implications has sped along the integration of AI into the military apparatus. "I'm ... not sure that they're having the same debates on principles of responsible use or they're definitely not applying our democratic values to these technologies,” he said. Meanwhile, the EU — which has pledged to roll out the world's first binding rules on AI in coming weeks — is seeking closer collaboration with Washington to oversee emerging technologies, including artificial intelligence. But those efforts have been slow in getting off the ground. For Geoană, that collaboration will happen at NATO, which is working closely with the European Union as it prepares AI regulation focusing on “high risk” applications.

NATO does not regulate, but “once NATO sets a standard, it becomes in terms of defensive security the gold standard in that respective field,” Geoană said. The alliance's own AI strategy, to be released before the summer, will identify ways to operate AI systems responsibly, identify military applications for the technology, and provide a “platform for allies to test their AI to see whether it's up to NATO standards,” van Weel said. 

Biotechnology

Biotechnology has been a part of human society for as long as documented history. Early

forms of biotechnology include the use of yeast to leaven bread, as well as the use of algae to

17

Page 19: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

make cakes. These ancient forms of biotechnology may have been emerging technologies at one

point in human history, but today, the use of biological organisms or their byproducts for

mundane matters like making cheese and yogurt are not what comes to mind when the term

biotechnology is used. The term was first documented in 1919 by a Hungarian engineer, but this

was not the real beginning of biotechnology’s importance or development. There are clear phases

of development in the science of biotechnology extending from ancient uses in agriculture, to

classical developments during the 19th century, and finally extending to today’s modern period of

exponential development (Verma, et al, 2011). Modern biotechnology has even taken on an air

of science fiction. As readers and viewers of the Bond series, Q introduces the audience to

biotechnology with “smart blood” used in Spectre to track 007, which is no longer far off the

mark of realized science as DNA databases grow in size and scope.  Again, another opportunity

for crisis facing the world.

The evolution of biotechnology toward an understanding of genes and their influence on

health defines the modern iteration of biotechnology and certainly gains the most attention. In

the last two decades, CRISPR technology, a relatively esoteric niche, has been widely discussed

and debated. It is a gene editing tool with the potential to revolutionize the treatment of disease at

the genetic level (Ledford, 2020). It also offers prospects for the development of agriculture and

energy through the creation of disease resistant crops and biofuels (Weiss, 2016). However,

biotechnology is not without risks. As with any technology, the potential for misuse exists. This

is particularly true for technologies described as “dual-use,” where the innovation can be

employed to benefit or harm society. These possibilities include but are not limited to the

following:

Galatas, Ioannis. “The misuse and malicious uses of the new biotechnologies”, Annales des Mines - Réalités industrielles, vol. février 2017, no. 1, 2017, pp. 103-108.

18

Page 20: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Bio-defense: Scientific and technological changes in detection, identification, diagnosis and protection provide increased capabilities to counter or protect against biological weapons.

Genetic modifications: Considerable research on genetically modified live vaccines able to immunize simultaneously against multiple antigens while knowledge of the molecular basis of antigens led to antibody reagents of improved specificity.

Mechanism of action of micro-organisms: Using molecular biology, mechanisms of virulence and infection have been identified, raising fears for deliberate manipulation of these mechanisms (e.g. via transferring genetic traits into naturally infectious micro-organisms or via altering their immunogenicity thus invalidating both vaccines and diagnostic methodologies).

Micro-biological developments: Better knowledge of protein synthesis and assembly led to production and isolation of various proteins (e.g. Escherichia coli; Yersinia spp.).

Human Genome Project (HGP): Identification and localization of genes causing hereditary diseases and simplification of the development of pharmaceutical drugs for treatment of hereditary diseases. HGP provides sufficient data on ethnic genetic differences between population groups, raising fears for future “ethnic bombs” (micro-organisms attacking known receptor sites or targeting DNA sequences inside cells by viral vectors). A study in the US on the Y-chromosome and mitochondrial DNA in populations from different regions has suggested that the data generated could be used for developing methods to selectively disturb cellular respiration and energy exchange, sexual reproduction and a number of other important functions connected with the Y-chromosome. A recent study in Taiwan has discovered that Severe Acute Respiratory Syndrome (SARS) can be associated with specific genetic profiles. Human Genome Project (HGP) – completed in 2003 – discovered all the estimated 20,000-25,000 human genes and determined the complete sequence of the three billion DNA subunits bases in the human genome.

Toxins and Regulators: Large-scale extraction and production (lower cost/shorter time) of potent toxins, which until now were available only in minute quantities from immense amounts of natural biological materials. Understanding of bio-regulators and their effects, when present in abnormal concentrations. The possibility to manipulate toxins or bio-regulators or to produce them in pure form in large quantities opens up new perspectives that have to be considered with implications for BTWC. Bio-regulators are considered to pose a serious threat of being used for illicit purposes due to the increased understanding of inter- and intra- cellular processes and control of central biological processes of mammalian systems, including human. Much interest these days has been generated in identification and purification of toxins from marine resources having therapeutic potential. Though isolated in small quantities, they have already been shown to have potential of exploitation for generating significant amounts of bioactive substances of both therapeutic and harmful effects. Recently a bioactive peptide, a synthetic conotoxin compound produced by cone snails, has

19

Page 21: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

been licensed for use in the treatment of severe chronic pain. Botulinum toxin is a therapeutic for a number of disease conditions. The catalytically active and toxic A-subunit portion of these toxins conjugated with antibodies raised against specific antigens found on the surface of tumour cells is used for site-directed anticancer therapy. B-subunit toxins are being exploited to study intracellular delivery mechanisms like delivery of therapeutic agents to neural cells for the treatment of neural dysfunctions. It is also well known that botulinum toxin is a potential bio-agent for military use.

Biotechnology’s array of applications is apparent in healthcare, agriculture,

environmental protection, and even energy. In each of these areas, potential cases could act to

improve cooperation to benefit innovation or manage risk. Avenues for the employment of

biotechnology seem limitless. For example, biotechnology has made it possible to create edible

vaccines. Innovations of this type are exciting as they have the potential to prevent common

diseases particularly in developing countries. 

Kurup, Vrinda M, and Jaya Thomas. “Edible Vaccines: Promises and Challenges.” Molecular biotechnology vol. 62,2 (2020): 79-90. doi:10.1007/s12033-019-00222-1

Edible vaccines offer a better choice predominantly in developing countries because they are cost-effective, easily administrable, no storage issues and bio-friendly. Edible vaccines provide mucosal activity along with systemic immunity. Plant-based vaccines are comparatively more easier to manufacture, while normal vaccine production requires highly sophisticated and expensive techniques for bulk production as in mammalian and microbial cell culture . The statistics show that the entire population in China requires only 40 acres of land for production of hepatitis B edible vaccines annually. As per this, 200 acres of plot is required for the production of edible vaccine for all infants in the world [15]. Various edible products like plants, algae, insect cells, whole yeast and lactic acid bacteria are used as alternative agents for parenteral vaccines [15].

Examples such as this, demonstrate biotechnology’s broad range of utilization. The opportunities

for international cooperation across a host of issues makes biotechnology a rich source of policy

options for debaters. 

In addition, biotechnology is a prime example of how domestic action may not go far

enough to influence the path of technology innovation and use. While the U.S. may be able to

20

Page 22: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

control where innovation occurs for domestic entities, there is growing concern that it will not be

able to exert as much influence in the future. When considering international competition, one

potential risk for US security is China’s aggressive development of biotechnology. While the

U.S. is still dominant in this area, indications show that China is a growing threat. Furthermore,

there are mutual risks to both countries from unregulated use of biotechnology and its potential

misuse by terrorist groups. This highlights China as an important adversary and counterpart in

international biotechnology initiatives. 

Moore, Scott ( Director of China Programs and Strategic Initiatives, University of Pennsylvania). “China’s Role in the Global Biotechnology Sector and Implications for US Policy.” Brookings Institute. April 2020. https://www.brookings.edu/wp-content/uploads/2020/04/FP_20200427_china_biotechnology_moore.pdf 

The certainty that China will play an increasingly important role in the global biotechnology sector poses several issues for U.S. policymakers. The gravest of these pertain to national security. Though there is presently no sign that China’s capabilities exceed those of the United States, some researchers have noted that biotechnology is a focus of increasing attention by the People’s Liberation Army. U.S. policymakers and security analysts have also raised concerns that the dominant market position of Chinese firms in producing active pharmaceutical ingredients might allow Beijing to disrupt U.S. access to lifesaving drugs in the event of a conflict. On the other hand, the use of tools like CRISPR, which is increasingly inexpensive and easy to use, by terrorists and non-state actors to potentially create novel bioweapons poses severe security threats to both the United States and China. It would seem to be in the interest of all states, including China, to strengthen efforts, currently led mostly by the private sector, to prevent dangerous actors from gaining access to DNA templates and other relevant materials

Biotechnology also converges with the other areas of the topic in important ways. This

offers debaters the opportunity to address multiple concerns within a debate round. A synergy

between topic areas allows affirmative teams to explore unique solvency options and advantages

while providing negative teams ground to explore gaps in solvency for potential cases.

Richardson, Lauren C (author) et al. “Cyberbiosecurity: A Call for Cooperation in a New Threat Landscape.” Frontiers in bioengineering and biotechnology vol. 7 99. 6 Jun. 2019, doi:10.3389/fbioe.2019.00099

21

Page 23: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Industry interest in artificial intelligence (AI) has experienced a resurgence in recent years due to increased computing power, advancing applications of neural networks, and an emergence of new machine and deep learning techniques across the biology sector. Biotechnology companies are successfully utilizing these developments for drug design and development (Zilinskas, 2017), genomics (Pauwels and Vidyarthi, 2017), evolutionary biology (Feltes et al., 2018), protein folding (Paladino et al., 2017), and more. This rapid and evolving interest in the landscape of new AI technologies has led to emerging threat domains related to information privacy and storage, ownership over biological and genetic data, and applications of powerful technologies (Pauwels, 2018). These issues are not new, as bioinformatics and digitization have created a potential target; however, the popularization of AI has refreshed these concerns in the modern zeitgeist. There is a renewed opportunity for life science and cybersecurity professionals to design and implement frameworks to facilitate responsible application of AI techniques to biology.

In conclusion, the international response to biotechnology is an important factor for

debate. Can the international community afford not to act to prevent the potential harms of

biotechnology? Could the international community provide meaningful guidance for

biotechnology without stifling innovation? Is international cooperation key to stimulating

creativity in the field of biotechnology? Will the global community be prepared to respond to

biological threats both naturally occurring or man-made in the future? These questions are

central to the debate over US international cooperation on emerging technologies in the field of

biotechnology.

Cybersecurity

In the 2012 production of Skyfall, British intelligence is facing an unknown cybersecurity

threat designed to wreak havoc on M16, Bond, and the world.  But, in the real world, the United

States faces the biggest risk during the Trump administration, and now, the current

administration, as well. Currently, the U.S. confronts a similar crisis from Russian and Chinese

hackers who want to gain access to U.S. servers. Cyberspace creates a unique vulnerability for

attack in the United States as laws block the ability of intelligence agencies to use domestic

internet service providers as a base for attacks.  

22

Page 24: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Lawmakers are being tasked, by the NSA and our nation’s leading cybersecurity experts,

to create solutions preventing hackers’ access to U.S. servers.  The recent exploitation of

Microsoft Exchange servers, by the Russian and Chinese governments, left the U.S. blind to the

cyber intrusion. On May 8, 2021, DarkSide (alleged Russian hackers) breached the Colonial

Pipeline, part of U.S. energy infrastructure, to create chaos.  Whether this is in response to

President Biden’s sanctions on Russia, is unknown.  However, NSA can only monitor foreign

internet traffic.  NSA would have to request lawmakers to expand their domestic cyber authority

for limited circumstances.  This is a concern for lawmakers because of watchdog and 4th

Amendment privacy rights’ groups, as the U.S. has a long and documented history of using

broad surveillance authority to collect information about its citizens. However, a failure to take

action means ceding Russian, Chinese, North Korean, Iranian, and other non-state hackers’

access to critical public and private systems in the U.S.  The Council of Foreign Relations

counters this pressure by reminding decision makers that there is no indication that expanding

the scope of NSA authority would have resulted in discovering the recent Solar Wind attacks. 

Tonya Riley, technology and cybersecurity researcher for the Washington Post, argues:

Riley, Tonya (Technology and cybersecurity policy researcher).  “Analysis | The Cybersecurity 202: NSA Director Says Intelligence Has a Big Blind Spot: Domestic Internet Activity.” The Washington Post, WP Company,  26 Mar. 2021, www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-says-intelligence-has-big-blind-spot-domestic-internet-activity/#click=t.co/kg8XkfRoXH.

National Security Agency Director Gen. Paul Nakasone stressed that foreign hackers are taking advantage of the intelligence community's “blind spot” – domestic Internet activity. “Our adversaries understand that they can come into the United States and rapidly utilize an Internet service provider, come up and do their activities, and then take that down before a warrant can be issued, before we can actually have surveillance by a civilian authority here in the United States,” he told the Senate Armed Services Committee in a rare hearing. Washington is scrambling for solutions in light of two major recent hacks in which attackers used U.S. internet infrastructure. In a sweeping Russian hack of at least nine government agencies and 100 companies, hackers used Amazon cloud services and GoDaddy domains to launch malicious software used in the attack. Those hackers went

23

Page 25: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

unnoticed by the government for almost nine months. Chinese hackers that compromised thousands of Microsoft Exchange servers also used U.S. based servers . “It’s not the fact that we can’t connect the dots. We can’t see all of the dots,” Nakasone told lawmakers. The NSA only has authorization to monitor foreign Internet traffic. And although the FBI and the Department of Homeland Security have some authority over Internet traffic within the United States, the authorities require a warrant. It's against this backdrop that some experts want to expand NSA authorities to monitor domestic Internet traffic under limited circumstances.

Instead, the Council recommends the U.S. should focus on creating public-private partnerships

(PPP’s) to combine cyber intelligence and coordinate more effective responses to threats.  These

PPP’s do not come without their own concerns.  Private industry is reluctant to share discovery

of software vulnerabilities with the U.S. government and the National Security Agency (NSA).

These organizations consistently refuse to fix vulnerabilities and instead engage in a policy of

leaving “Backdoors” for future Offensive Cyber Operations (OCO’s).  Regardless of concerns,

lawmakers are currently drafting legislation requiring private companies to disclose these

vulnerabilities to the U.S. government and its agencies.

Analysis of the recent Solar Winds attacks by private cyber security firms carrying out

the ongoing attacks on the U.S., European governments, and private businesses confirm the

impact of this breach. The examination of the servers reveals the groups responsible for the

attack, the scope and breadth of the attacks, and the far-reaching nature of their exploitation of a

vast array of targets, Covid-19 test manufacturers, and defense and aerospace companies. 

Analysis of hacking patterns discloses EvilCorp as the culprit.

Lepido, Daniele (senior reporter for Bloomberg News). “Swiss Cyber Security Firm Says It Accessed Servers of a SolarWinds Hacking Group.” Insurance Journal, 3-23-2021,https://amp-insurancejournal-com.cdn.ampproject.org/v/s/amp.insurancejournal.com/news/international/2021/03/23/606548.htm?amp_gsa=1&amp_js_v=a6&usqp=mq331AQFKAGwASA%3D -amp_tf=From%20%251%24s&aoh=16166058694112&csi=0&referrer=https%3A%2F%2F www.google.com&ampshare=https%3A%2F%2Fwww.insurancejournal.com %2Fnews%2Finternational%2F2021%2F03%2F23%2F606548.htm

24

Page 26: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

A Swiss cyber-security firm says it has accessed servers used by a hacking group tied to the SolarWinds breach, revealing details about who the attackers targeted and how they carried out their operation. The firm, PRODAFT, also said the hackers have continued with their campaign through this month. PRODAFT researchers said they were able to break into the hackers’ computer infrastructure and review evidence of a massive campaign between August and March, which targeted thousands of companies and government organizations across Europe and the U.S. The aim of the hacking group, dubbed SilverFish by the researchers, was to spy on victims and steal data, according to PRODAFT’s report. SilverFish carried out an “extremely sophisticated” cyber-attack on at least 4,720 targets, including government institutions, global IT providers, dozens of banking institutions in the U.S. and EU, major auditing/consulting firms, one of the world’s leading COVID-19 test kit manufacturers and aviation and defense companies, according to the report. “[The] hackers maintained regular working hours and were most active Monday to Friday between the hours of 8 a.m. and 8 p.m., the report said. The hackers operated servers in Russia and Ukraine, and shared some of the same servers as a notorious Russian criminal hacking group known as Evil Corp.”

The concerns from private industry reflect the history of the NSA paying for and collecting

software exploits and code vulnerabilities to exploit in their own cyber-attacks against our

nation’s enemies.  Unfortunately, the U.S. guided the world in cyberspace since the 1990’s, but

the recent theft of NSA hacking tools and espionage against the U.S. led to the release of “Zero

Day” exploits to transnational criminals, state actors, and the public on the Dark Web.  The most

dangerous cyber weapons have been turned and pointed against our country.  The Biden

administration remains committed to regulation of the technology industry and forcing software

companies to disclose and share all known vulnerabilities with their products to the government. 

The motivation for this forced sharing is to create more effective “resiliency” in networks that

control our critical infrastructure by creating new coding standards for the tech industry.

Riley, Tonya, (Technology and cybersecurity policy researcher). "The Cybersecurity 202: NSA director says intelligence has a big blind spot: domestic Internet activity." Washington Post, 3-26-21, https://www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-says-intelligence-has-big-blind-spot-domestic-internet-activity/#click=https://t.co/kg8XkfRoXH

A judge rejected a request by an ex-CIA employee to dismiss charges of leaking hacking tools. A judge denied former CIA employee Joshua Schulte’s bid to dismiss espionage charges on

25

Page 27: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

the grounds that the grand jury that indicted him did not have enough Hispanic or Black individuals, Larry Neumeister of the Associated Press reports. A trial for Schulte, who is accused of leaking CIA hacking tools to WikiLeaks and has pleaded not guilty to all charges, is expected to begin in October after a jury deadlocked last year. WikiLeaks’ 2017 release of the hacking tools was one of the most significant leaks in the CIA’s decades-long history and laid bare the agency’s hacking and surveillance methods. The Biden administration is readying an executive order to require companies to disclose breaches to U.S. government clients. A draft version of the order would also require companies to keep more records for investigations of the breaches and work with federal agencies as they respond, according to Reuters’s Christopher Bing, Nandita Bose and Joseph Menn. The order could be made public as early as next week, they write. The executive order comes as the Biden administration plans its responses to the devastating SolarWinds and Microsoft Exchange hacks. A National Security Council spokeswoman told Reuters no decision has been made on the final content of the executive order. Anne Neuberger, the deputy national security adviser for cyber and emerging technology, previewed the executive order earlier this month, when the government was still primarily grappling with SolarWinds. Neuberger said at the time that the executive order would “focus on building in standards for software, particularly software that’s used in critical areas.”

In response to the Solar Winds attacks, the U.S. must act to create new protections to its

networks and critical infrastructure.  Private companies, including Microsoft, are calling on the

government to assist in creating more robust defenses to cyber-attacks, instead of only focusing

U.S. cyber policy on the development and use of OCO’s against our enemies.  An example is the

recent electricity grid collapse in Texas demonstrates the weaknesses inherent in much of the

critical infrastructure of our nation, and the vulnerability of citizens to the effects of a cyber-

attack.  A second failed cyber-attack on water treatment facilities in Florida creates a new

nightmare for America. Every part of the public and private sector is currently vulnerable to

attack (Gould, 2021).

The question is not should we act, it is how we should act in response to this growing

threat.  Congress needs to create a better system of intelligence sharing between the government

and private technology companies, to help identify and neutralize coding errors and system

vulnerabilities that our adversaries could exploit.  The disorganized nature of our government’s

response to the latest attacks creates a need for swift action and new partnerships.  The threat of

26

Page 28: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Russian and Chinese cyber-attacks calls for bipartisan support that would strengthen U.S. cyber

defenses.  As it becomes evident, the current capabilities and bureaucracies within our

government are not suited to meet the challenges that we face.

To address these growing cybersecurity issues, President Biden imposed sanctions on

Russia as of April 15, 2021.  In addition, our European allies and the U.S. are in joint agreement

of deterring Russia’s military presence in Crimea and Ukraine (Sanger, David E., and Andrew E.

Kramer, 2021).  The question becomes when and how will Russia respond to these bilateral and

multilateral reprimands?

II.   Resolutions

1. The USFG should substantially increase its security cooperation with NATO in one or more of the following: artificial intelligence, biotechnology, cybersecurity.

2. NATO should substantially increase its security cooperation in one or more of the following: artificial intelligence, biotechnology, cybersecurity.

3. The USFG and NATO should substantially increase their security cooperation for one or more of the following: artificial intelligence, biotechnology, cybersecurity.

4.  The USFG and NATO should substantially increase their policy cooperation in one or more of the following: artificial intelligence, biotechnology, cybersecurity.

5. The USFG and NATO should substantially increase their engagement in one or more of the following: artificial intelligence, biotechnology, cybersecurity.

6. The USFG and NATO should substantially increase their technology cooperation for one or more of the following:  artificial intelligence, biotechnology, cybersecurity.

27

Page 29: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

III.  Definitions

Artificial Intelligence

The FY2019 National Defense Authorization Act (via Congressional Research Service, https://fas.org/sgp/crs/natsec/R45178.pdf) defines “artificial intelligence” as:

Almost all academic studies in artificial intelligence acknowledge that no commonly accepted definition of AI exists, in part because of the diverse approaches to research in the field. Likewise, although Section 238 of the FY2019 National Defense Authorization Act (NDAA) directs the Secretary of Defense to produce a definition of artificial intelligence by August 13, 2019, no official U.S. government definition of AI yet exists. 6 The FY2019 NDAA does, however, provide a definition of AI for the purposes of Section 238: 1. Any artificial system that performs tasks under varying and unpredictable circumstances without significant human oversight, or that can learn from experience and improve performance when exposed to data sets. 2. An artificial system developed in computer software, physical hardware, or other context that solves tasks requiring human-like perception, cognition, planning, learning, communication, or physical action. 3. An artificial system designed to think or act like a human, including cognitive architectures and neural networks. 4. A set of techniques, including machine learning that is designed to approximate a cognitive task. 5. An artificial system designed to act rationally, including an intelligent software agent or embodied robot that achieves goals using perception, planning, reasoning, learning, communicating, decision-making, and acting.7

Britannica (https://www.britannica.com/technology/artificial-intelligence) defines “artificial intelligence” as:

Artificial intelligence (AI) is the ability of a computer or a robot controlled by a computer to do tasks that are usually done by humans because they require human intelligence and discernment. Although there are no AIs that can perform the wide variety of tasks an ordinary human can do, some AIs can match humans in specific tasks.

IBM (https://www.ibm.com/cloud/learn/what-is-artificial-intelligence) defines “artificial intelligence” as:

In computer science, the term artificial intelligence (AI) refers to any human-like intelligence exhibited by a computer, robot, or other machine. In popular usage, artificial intelligence refers to the ability of a computer or machine to mimic the capabilities of the human mind—learning from examples and experience, recognizing objects, understanding and responding to language, making decisions, solving problems—and combining these and other capabilities to perform functions a human might perform, such as greeting a hotel guest or driving a car.

General AI

The Congressional Research Service (https://fas.org/sgp/crs/natsec/R45178.pdf) defines “General AI” as:28

Page 30: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Experts generally agree that it will be many decades before the field advances to develop General AI, which refers to systems capable of human-level intelligence across a broad range of tasks.10 Nevertheless, the rapid advancements in Narrow AI have sparked a wave of investment, with U.S. venture capitalists raising an estimated $18.5 billion for AI research in 2019 alone. 11 Similarly, DOD’s unclassified investments in AI have grown from just over $600 million in FY2016 to $2.5 billion in FY2021 (including investments in autonomy), with the Department reportedly maintaining over 600 active AI projects. 12

Narrow AI

The Congressional Research Service (https://fas.org/sgp/crs/natsec/R45178.pdf) defines “Narrow AI” as:

The field of AI research began in the 1940s, but an explosion of interest in AI began around 2010 due to the convergence of three enabling developments: (1) the availability of “big data” sources, (2) improvements to machine learning approaches, and (3) increases in computer processing power.8 This growth has advanced the state of Narrow AI, which refers to algorithms that address specific problem sets like game playing, image recognition, and navigation. All current AI systems fall into the Narrow AI category. The most prevalent approach to Narrow AI is machine learning, which involves statistical algorithms that replicate human cognitive tasks by deriving their own procedures through analysis of large training data sets. 9 During the training process, the computer system creates its own statistical model to accomplish the specified task in situations it has not previously encountered.

Enterprise AI

NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-dynamic-adoption-responsible-use/index.html) defines “Enterprise AI” as:

Enterprise AI includes applications such as AI-enabled financial or personnel management systems, which are deployed in tightly controlled environments, where the implications of technical failures are low (in terms of immediate danger and potential lethality).

Operational AI

NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-dynamic-adoption-responsible-use/index.html) defines “Operational AI” as:

Operational AI, by contrast, can be deployed in missions and operations, i.e. in considerably less controlled environments and such that the implications of failure may be critically high. Examples include the control software of stationary systems or those of unmanned vehicles.

Mission Support AI

NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-dynamic-adoption-responsible-use/index.html) defines “Mission Support AI” as:

29

Page 31: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Mission Support AI, an intermediate category in terms of environment control and failure implications, includes a diverse set of applications, e.g. logistics and maintenance, or intelligence-related applications.

Machine Learning

NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-dynamic-adoption-responsible-use/index.html) defines “Machine Learning” as:

The contemporary wave of AI, or Second Wave AI, is centered on Machine Learning (ML). ML involves the development and use of statistical algorithms to find patterns in data. For example, a classification algorithm can be trained on a large set of correctly labelled examples to determine to which previously encountered category a newly observed object belongs.

Deep Learning

NATO (https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-dynamic-adoption-responsible-use/index.html) defines “Deep Learning” as:

Deep Learning is a subset of ML, which uses multiple computational layers (Artificial Neural Networks with multiple layers) for the handling of computationally demanding pattern recognition or prediction problems, e.g. Convolutional Neural Networks for object detection within images.

Biotechnology

Biotechnology used to solve problems.  Britannica defines “biotechnology” as:https://www.britannica.com/technology/biotechnology 

Biotechnology, the use of biology to solve problems and make useful products. The most prominent area of biotechnology is the production of therapeutic proteins and other drugs through genetic engineering.

Biotechnology is a broad termDieuliis, Diane. “Biotechnology for the Battlefield: In Need of a Strategy.” War on the Rocks, 27 Nov. 2018, warontherocks.com/2018/11/biotechnology-for-the-battlefield-in-need-of-a-strategy/. 

Biotechnology — a broad term used to describe technological innovation based on biology — 

Norweigan University of Science and Technology defines biotechnologyhttps://www.ntnu.edu/ibt/about-us/what-is-biotechnology 

Biotechnology is technology that utilizes biological systems, living organisms or parts of this to develop or create different products.

30

Page 32: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Biotechnology is an umbrella term for an ever expanding area of researchHilgartner, Stephen. “Biotechnology.” International Encyclopedia of the Social and Behavioral Sciences. 2001. https://www.sciencedirect.com/science/article/pii/B0080430767031478 

Defining biotechnology poses challenges, for the word is less a tightly-defined, technical term than a loose umbrella category, or even a slogan, that conveys—sometimes simultaneously—visions of unbounded progress and unregulated tampering with nature. Many authors have tried to capture biotechnology within their own well-crafted definitions, but these attempts cannot neatly contain this expanding network of activities and its increasingly dense connections to diverse social worlds. Although the word has a long history (Bud 1993), in most contemporary contexts biotechnology refers to a novel and growing collection of techniques, grounded in molecular and cell biology, for analyzing and manipulating the molecular building blocks of life. The term also designates products, such as pharmaceuticals or genetically-modified foods, created using these techniques. At times, it refers not to products or techniques but to an economic sector or area of research.

Biotechnology often seen narrowly through the lens of security riskDieuliis, Diane. “Biotechnology for the Battlefield: In Need of a Strategy.” War on the Rocks, 27 Nov. 2018, warontherocks.com/2018/11/biotechnology-for-the-battlefield-in-need-of-a-strategy/. 

Biotechnology — a broad term used to describe technological innovation based on biology — has become an increasingly agile platform for developing new types of soldier enhancements. As such, the field offers novel opportunities for improving warfighter survivability on the battlefield. Despite recent developments, however, the Department of Defense has yet to strategically guide the development of these new technologies at the national level. Recently, War on the Rocks published an article outlining concerns about the lack of coordinated policy for developing synthetic biology – a branch of biotechnology – while preventing its misuse by adversaries. The article rightly pointed to the need to think strategically about the risk of proliferating synthetic biology capabilities, but this is only one part of the picture. Current national strategies encourage policymakers to view advances in biology through a narrow lens of risks to national security and the development of countermeasures to protect against those risks, which, while crucial, neglects the promise for using the same science to develop life-saving or other advanced tools for warfighters. The Pentagon’s current efforts to take advantage of synthetic biology as a platform for defense lack internal cohesion and external direction, and biological innovation faces further challenges given the absence of agile business models to fully harness emerging biotechnologies for the battlefield. Greater coordination between those in the Defense Department whose work relates to biotechnology and improved relationships with the private sector are important first steps toward using this burgeoning area of science not just to mitigate security risks, but also to benefit soldiers on the battlefield.

Agricultural biotechnology is internationally accepted and beneficialhttps://www.state.gov/agricultural-policy/biotechnology/

31

Page 33: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

As of 2019, genetically engineered crops were grown in 29 countries while 42 additional countries imported these crops.  Of the countries that grow biotech crops, ten are in Latin America, six are in Africa, two in North America, two in Europe, and nine are in Asia and International acceptance will continue to grow as science-based, risk-proportionate regulations are developed regarding the cultivation and trade of biotech crops and people experience the benefits. However, widespread misunderstanding persists about this technology, its safety, and the breadth of its potential. Foods derived through advanced agricultural technology undergo extensive risk assessment procedures by a variety of national bodies such as the Environmental Protection Agency, the United States Department of Agriculture, and the Food and Drug Administration. Biotech crops also undergo analysis by international entities such as the European Food Safety Agency. Any biotech crops approved by these bodies have been designated as safe for both people and the environment. International acceptance will continue to grow as science-based regulations are developed regarding the cultivation and trade of biotech crops and people experience the benefits.

Cybersecurity

Digital Guardian defines “cyber security” as:

https://digitalguardian.com/blog/what-cyber-security

Cyber security  refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from   attack, damage, or unauthorized access. Cyber security   may also be referred to as information technology   security. Oct 5, 2020

https://csrc.nist.gov/glossary/term/cybersecurity

The process of protecting information by preventing, detecting, and responding to attacks. Source(s): NISTIR 8183 under Cybersecurity NIST Cybersecurity Framework Version 1.1, NIST Cybersecurity Framework Version 1.0.

https://www.merriam-webster.com/dictionary/cybersecurity

 Definition of cybersecurity: measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack

https://searchsecurity.techtarget.com/definition/cybersecurity

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.

32

Page 34: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organization's or user's systems and sensitive data. Cybersecurity is also instrumental in preventing attacks that aim to disable or disrupt a system's or device's operations.

https://www.forcepoint.com/cyber-edu/cybersecurity

Also referred to as information security, cybersecurity refers to the practice of ensuring the integrity, confidentiality, and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access.

Engagement

https://www.collinsdictionary.com/dictionary/english/engagement

An engagement is an arrangement that you have made to do something at a particular time.

https://www.oxfordlearnersdictionaries.com/us/definition/english/engagement

an arrangement to do something at a particular time, especially something official or something connected with your job

https://www.definitions.net/definition/military+engagement

military engagement Routine contact and interaction between individuals or elements of the Armed Forces of the United States and those of another nation 

https://www.collinsdictionary.com/dictionary/english/engagement 

A military engagement is an armed conflict between two enemies.The constitution prohibits them from military engagement on foreign soil.

NATO

https://kevtellier.substack.com/p/march-29-2021-reading-notes-ryan

North Atlantic Treaty Organization: an organization formed in Washington, D.C. (1949), comprising the 12 nations of the Atlantic Pact together with Greece, Turkey, and the Federal Republic of Germany, for the purpose of collective defense against aggression.

https://www.thebalance.com/nato-purpose-history-members-and-alliances-330611633

Page 35: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The North Atlantic Treaty Organization (NATO) is an alliance of 30 countries that border the North Atlantic Ocean.1 The Alliance includes the United States, most European   Union members, the United Kingdom, Canada, and Turkey.

https://www.collinsdictionary.com/us/dictionary/english/nato

NATO is an international organization which consists of the U.S., Canada, Britain, and other European countries, all of whom have agreed to support one another if they are attacked. NATO is an abbreviation for 'North Atlantic Treaty Organization.'

Policy

https://www.dictionary.com/browse/policy

a course of action adopted and pursued by a government, ruler, political party, etc.:our nation's foreign policy.

https://legal-dictionary.thefreedictionary.com/Policy

As applied to a  law, ordinance, or Rule of Law, the general purpose or  tendency considered as directed to  the welfare or prosperit of  the state or community.

Cooperation

https://link.springer.com/chapter/10.1057/9780230372214_2

What do international relations scholars understand by the term ‘cooperation’? Whereas realists and neoliberals disagree about the importance of international cooperation, there is widespread agreement on a working definition.1 Cooperation arises, ‘when actors adjust their behaviour to the actual or anticipated preferences of others, through a process of policy coordination’.2 

https://www.merriam-webster.com/dictionary/cooperation

: the actions of someone who is being helpful by doing what is wanted or asked for : common effort.  We are asking for your full cooperation.

 https://link.springer.com/chapter/10.1057/9780230372214_2

What do international relations scholars understand by the term 'cooperation'? ... Cooperation arises, 'when actors adjust their behaviour to the actual or anticipated preferences of others, through a process of policy coordination'.

Foreign Policy Cooperation

https://www.britannica.com/topic/foreign-policy

34

Page 36: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Foreign policy, general objectives that guide the activities and relationships of one state in its interactions with other states. The development of foreign policy is influenced by domestic considerations, the policies or behaviour of other states, or plans to advance specific geopolitical designs.

“The Emergence of Foreign Policy Halvard Leira.” International Studies Quarterly, Volume 63, Issue 1, March 2019, Pages 187–198,  accessed on 05 February 2019  https://academic.oup.com/isq/issue/63/1

The discipline of international relations offers two different takes on “foreign policy.” First, it sees foreign policy as carrying a self-evident meaning: as an abstract expression of relations between political entities: “Broadly interpreted, foreign policy is about the fundamental issue of how organized groups, at least in part strangers to each other, interrelate” (Hill 2003, xvii). Such definitions render foreign policy as an analytic concept that transcends particular historical periods or kinds of political communities. It is always distinct, and essentially different, from other forms of policy. Second, critics of this account suggest that foreign policy provides one of the key ways in which the political Self is differentiated from the Other: “Foreign policy was not a bridge between two distinct realms, but something that both divided and joined the inside and the outside, the state and the interstate system” (Campbell 1998, 60). In this understanding, foreign policy emerged sometime during the seventeenth century. It was producer, and the product, of the modern state and state system.

https://study.com/academy/lesson/cooperation-among-states-political-military-economic-alliances.html#:~:text=Being%20more%20of%20a%20concept,the%20deciding%20of%20territorial%20boundaries.

Being more of a concept than a term, political cooperation broadly denotes the governments of differing states working together toward a common goal. This cooperation can occur in areas like military alliances, economic affairs, and the deciding of territorial boundaries.

 Probably one of the most famous examples of political cooperation is the United Nations. Formed after World War II, the United Nations is an intergovernmental organization tasked with the job of promoting and maintaining political cooperation among the world's nations.

 https://oxfordre.com/internationalstudies/internationalstudies/abstract/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-93

The study of international cooperation has emerged and evolved over the past few decades as a cornerstone of international relations research. Our strategy for reviewing such a large literature is to focus primarily on the rational choice and game theoretic approaches that instigated it and have subsequently guided its advance. Without these theoretical efforts, the study of international cooperation could not have made nearly as much progress—and it certainly would not have taken the form it does in the 21st

35

Page 37: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

century. Through this lens, we identify major themes in this literature and highlight key challenges for future research.This definition of international cooperation is general in terms of both actors and issues. Cooperation occurs not only among individuals but also among collective entities, including firms, political parties, ethnic organizations, terrorist groups, and nation-states. Although ICT often defines international cooperation in terms of states, it can also involve other actors, especially intergovernmental organizations (IGOs) and nongovernmental organizations (NGOs). These diverse actors cooperate for different objectives across a wide range of issue areas: IGOs work with states to combat global environmental problems, firms collude to monopolize markets, NGOs campaign to save the whales, and so on. Finally, international cooperation is not always a good thing, at least from the perspective of those excluded or targeted. For example, international sanctions involve cooperation against target countries (Martin, 1992a; Drezner, 1999), and commodity cartels often harm consumer states.Cooperation is supported in repeated settings because of the possibility of reciprocity: if you cooperate with me, then I will cooperate with you in the future; but if you do not cooperate, then neither will I. If both actors take this position—as in the famous tit-for-tat strategy pairing—then ongoing cooperation is supported against current defection incentives by actors’ interest in maintaining cooperation into the future. This analysis opens up the possibility of cooperation and raises interesting questions regarding the conditions under which strategies of reciprocity promote cooperation. Parallel empirical work (e.g., Goldstein, 1991; Ward & Rajmaira, 1992; Goldstein & Pevehouse, 1997) has shed important light on these conditions.

Foreign Policy

https://marketbusinessnews.com/financial-glossary/foreign-policy/

foreign policy or foreign relations refers to how a government deals with other countries. ... The government chooses its foreign affairs policy to safeguard the interests of the nation and its citizens. 'Trade,' in this context, means 'international trade,' i.e., imports, exports, tariffs, exemptions, etc.

https://www.britannica.com/topic/foreign-policy

Foreign policy, general objectives that guide the activities and relationships of one state in its interactions with other states. The development of foreign policy is influenced by domestic considerations, the policies or behaviour of other states, or plans to advance specific geopolitical designs. Leopold von Ranke emphasized the primacy of geography and external threats in shaping foreign policy, but later writers emphasized domestic factors. Diplomacy is the tool of foreign policy, and war, alliances, and international trade may all be manifestations of it.

https://www.dictionary.com/browse/foreign-policy noun

36

Page 38: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

a policy pursued by a nation in its dealings with other nations, designed to achieve national objectives.

Engagement https://www.merriam-webster.com/dictionary/engagement Definition of engagement

1a: an arrangement to meet or be present at a specified time and place

https://www.weforum.org/agenda/2015/04/why-engagement-is-the-key-to-us-foreign-policy/

From the beginning, however, the Obama administration has made clear that engagement is not an end in itself, but a means to various goals, both bilateral and regional.

Another source of doubt about America’s enduring influence lies in the fact that multilateral engagement is still needed, and this is always more difficult than bilateral engagement. Indeed, multilateral leadership requires not only clearer and bolder rules, but also a demonstrated willingness to bear the costs of those rules, whether by creating safe zones to uphold the “responsibility to protect” civilians or taking concrete steps to reduce – and eventually eliminate – nuclear arsenals.

Bilateral engagement will prove to be one of Obama’s most important foreign-policy legacies. But ensuring that the US can continue to lead in the twenty-first century will require a different kind of engagement. That will be a critical task for America’s next president.

https://www.state.gov/a-foreign-policy-for-the-american-people/

Over the decades, these commitments have created new markets for our products, new allies to deter aggression, and new partners to help meet global challenges.   We had a name for it: “enlightened self-interest.”   We’ll be clear that real partnership means carrying burdens together, everyone doing their part – not just us.   And whenever we can, we will choose engagement.   Wherever the rules for international security and the global economy are being written, America will be there, and the interests of the American people will be front and center.

Security

https://globalsecurityreview.com/what-is-security-everything/

Security is an inherently contested concept, encompassing a wide variety of scenarios, and is commonly used in reference to a range of personal and societal activities and situations.

37

Page 39: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Security can be distinguished between day-to-day security at the individual level (nutritional, economic, safety), security for favorable conditions (the rule of law and due process, societal development, political freedom), and security against adverse conditions or threats (war and violence, crime, climate change).The term security is used in three broad segments. The first is the general, everyday use of the term. In this instance, security refers to the desire for safety or protection. Second is the usage of the word for political purposes; relating to political processes, structures, and actions utilized to ensure a given political unit or entity is secure.  The term “security” is frequently used as a political tool to assign priority to a given issue or perceived threat within the broader political realm.Third, and finally, “security” can be employed as an analytical concept to identify, define, conceptualize, explain, or forecast societal developments such as security policy, institutions, and governance structures.

https://www.researchgate.net/publication/303899299_Concept_of_Security

Fundamentally, security has to do with the presence of peace, safety, gladness and. the protection of human and physical resources or absence of crisis or threats to. human dignity, all of which facilitate development and progress of any human. society. The concept of security has become a preoccupation for the decades.

https://www.peacepalacelibrary.nl/ebooks/files/370659244.pdf

Until fairly recently, the term ‘security’ was almost monopolized by the academic discipline of International Relations (IR). IR theorists employed it in a rather narrow sense which happened to correspond to the way politicians tended to use the word, i.e. as almost synonymous with military power. The more military power, or rather the more favourable the military balance, the more security. Surprisingly little was, however, written about security by the IR theoreticians, in the works of whom ‘national interest’ and/or ‘power’ were preferred, sometimes as alleged synonyms of security. In his seminal work on Realism, Hans Morgenthau thus hardly bothered to define ‘security’ii. Arnold Wolfers was one of the few who ventured a definition of the term: ‘security, in an objective sense, measures the absence of threats to acquired values, in a subjective sense, the absence of fear that such values will be attacked.’iii 

Security Cooperation

https://www.defense.gov/Explore/News/Article/Article/2048832/defense-department-begins-security-cooperation-workforce-program/

Security cooperation is the effort to advance U.S. national security and foreign policy interests by building the capacity of foreign security forces to respond to shared challenges.

https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_20_20172305.pdf

38

Page 40: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Security cooperation (SC) encompasses all Department of Defense (DOD) interactions, programs, and activities with foreign security forces (FSF) and their institutions to build relationships that help promote US interests; enable partner nations (PNs) to provide the US access to territory, infrastructure, information, ...May 23, 2017

https://www.dscu.mil/documents/publications/greenbook/01_Chapter.pdf?id=1

Security cooperation (SC) encompasses all Department of Defense (DOD) interactions, programs, and activities with foreign security forces (FSF) and their institutions to build relationships that help promote US interests; enable partner nations (PNs) to provide the US access to territory, infrastructure, information,....

https://www.dau.edu/cop/iam/Pages/Topics/Security%20Cooperation.aspx

DoD Security Cooperation is defined in Joint Pub 1-02: All DoD interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation.  DoD Directive 5132.03 provides DoD-wide policy and describes DoD organizational responsibilities regarding Security Cooperation activities.

DoD Security Cooperation includes International Armaments Cooperation (IAC) activities as well as the various elements of Security Assistance, including Foreign Military Sales (FMS) and Building Partner Capacity (BPC).  Most DoD Security Cooperation policy, organization, and activities (other than IAC) are led and managed by USD(Policy) rather than USD(Acquisition & Sustainment) and USD(Research & Engineering), but many U.S. Government/DoD Security Cooperation activities are implemented through USD(A&S), USD(R&E), and DoD Component acquisition-related IA&E efforts. 

The primary source of day-to-day guidance on Security Assistance and BPC policies and practices is the Defense Security Cooperation Agency (DSCA)-issued Security Assistance Management Manual (eSAMM).  FMS transactions are implemented through FMS Letters of Offer and Acceptance (LOAs), often referred to as "FMS cases."  BPC transactions are normally referred to as "pseudo-FMS cases."  

https://www.thefreedictionary.com/security+cooperation

All Department of Defense interactions with foreign defense establishments to build defense relationships that promote specific US security interests, develop allied and friendly military capabilities for self-defense and multinational operations, and provide US forces with peacetime and contingency access to a host nation. See also security assistance; security assistance organization.

policy cooperation

Cœuré, Benoît (Member of the Executive Board of the ECB, at the Global Research Forum on International Macroeconomics and Finance, Washington D.C.), European Central Bank, S14 November 2014

39

Page 41: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

https://www.ecb.europa.eu/press/key/date/2014/html/sp141114.en.htmlFor a central banker from the euro area, the notion of policy coordination and cooperation has a somewhat different meaning than it does for policymakers from other advanced economies.On the one hand, it has a global dimension capturing the difficult questions of whether and how to align monetary policies so as to achieve an optimal international policy mix. But on the other hand, it has a meaning as well in our domestic environment: within the euro area we are also involved, in a sense, in international policy cooperation. We have to achieve price stability in an environment of different national fiscal and structural policies. technology https://languages.oup.com/google-dictionary-en/

noun

1. the application of scientific knowledge for practical purposes, especially in industry.

"advances in computer technology"

o machinery and equipment developed from the application of scientific knowledge."it will reduce the industry's ability to spend money on new technology"

o the branch of knowledge dealing with engineering or applied sciences. https://www.britannica.com/technology/technology 

Technology, the application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment. 

https://www.merriam-webster.com/dictionary/technology

Technology (noun):

1)  (a): the practical application of knowledge especially in a particular area; (b): a capability given by the practical application of knowledge2)  a manner of accomplishing a task especially using technical processes, methods, or knowledge.3)  the specialized aspects of a particular field of endeavor.

 Hughes, Thomas. Human-Built World: How to Think about Technology and Culture. 2004.https://techliberation.com/2014/04/29/defining-technology/ 

“Technology is messy and complex. It is difficult to define and to understand. In its variety, it is full of contradictions, laden with human folly, saved by occasional benign deeds, and rich with unintended consequences.” (p. 1) “Defining technology in its complexity,” he continued, “is as difficult as grasping the essence of politics.” (p. 2)

40

Page 42: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

 Thomas Hughes’ definition: 

“a creativity process involving human ingenuity.” (p. 3) Arthur, W. Brian.  The Nature of Technology: What It Is and How It Evolves. 2009.

https://techliberation.com/2014/04/29/defining-technology/

1) “The first and most basic one is a technology is a means to fulfill a human purpose. … As a means, a technology may be a method or process or device… Or it may be complicated… Or it may be material… Or it may be nonmaterial. Whichever it is, it is always a means to carry out a human purpose.”2)  “The second definition is a plural one: technology as an assemblage of practices and components.”3)  “I will also allow a third meaning. This technology as the entire collection of devices and engineering practices available to a culture.” (p. 28, emphasis in original.) 

https://brainly.com/question/1406047 

The best definition of technology is the study and transformation of techniques, tools, and machines created by humans. Technology allows humans to study and evolve the physical elements that are present in their lives. 

https://www.researchgate.net/publication/320571654_A_Comprehensive_Definition_of_Technology_from_an_Ethological_Perspective 

 Definitions, uses, and understanding of technology have varied tremendously since Jacob Bigelow’s Elements of Technology in 1829. In addition to providing a frame of reference for understanding technology, the purpose of this study was to define or describe it conceptually. A determination of dimensions comprising technology was made by critiquing historical and contemporary examples of definition by Bigelow and Volti. An analytic-synthetic method was employed to deconstruct both definitions spanning two centuries to derive aspects of technology. Definitions relying on an anthropocentric “how humans use technology” viewpoint failed to account for different perspectives that were found when an ethological perspective inquiring “how technology is used” served as a framework. Findings support qualification of insulin as technology according to the following comprehensive definition: something inherently intelligent enough to either function, be used to function, or be interpreted as having a function that intelligent beings—human or otherwise—can appreciate, something devised, designed (by primary intention), or discovered (by secondary intention) serving particular purposes from a secular standpoint without humankind creating it, or a significant beneficiary of rationally derived knowledge that is “used for” a purpose without itself necessarily being translated into something material that “does” autonomously, or dependently when used.

 technology cooperation 

41

Page 43: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Philibert, Cedric (International Energy Agency). “International Energy Technology Collaboration And Climate Change Mitigation.” International Energy Agency. 2004.https://www.oecd.org/env/cc/32138947.pdf

“All countries are interested in being leaders in technology development – if not for protecting the climate, at least for competitive concerns. Therefore, one may think of technology cooperation as a way to engage more countries into action (or into more action).”  

Arranz, Nieves (Faculty of Economics and Business Administration) and Juan C. Fdez. de Arroyabe (ESIC Business & Marketing School). “Technological Cooperation:A New Type of Relations in the Progress of National Innovation Systems.” The Innovation Journal: The Public Sector Innovation Journal. 2009. https://www.innovation.cc › scholarly-style › 2009_14_2… 

We can define technological cooperation as the agreement between two or more independent agents who, by joining or sharing their skills and/or resources, develop and carry out a technological process with the aim of increasing their competitive advantages.  The resulting type of agreement will depend on the contingencies of the environment, the characteristics of the item to be transferred, the qualities and behaviour of the contracting agents, etc. and therefore numerous contractual arrangements will exist (Gulati, 1998). 

United Nations Industrial Development Organization and the World Business Council for Sustainable Development. “Developing Countries and Technology Development.” 2002. https://www.wbcsd.org/contentwbc/download/2337/29341 

Technology cooperation requires longer-term partnerships in which all parties have a vested interest in successful continuing operation. It requires incorporating both the “hardware” technology components and the equally essential range of “software” components. Both components are necessary to ensure a continuing stream of economic benefits that accrue fairly to all partners. This includes process machinery and equipment, as well as patented and unpatented manufacturing techniques and production knowhow. This can also include, more broadly, managerial, organizational, and marketing knowledge that contribute to the development of new skills.

IV. Timeliness

    For most of 2020, U.S. citizens were consumed with the pandemic, election fraud,

and police tactics.  However, with the new Biden administration, our lens is trained on not just

domestic problems, but geopolitical relationships and daunting hotspots or potential crises.  For

example, with the recent AI creation of humanlike robots, use of biotechnology for vaccines, and 42

Page 44: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

cybersecurity breach of Colonial Pipelines and SolarWinds, our government is facing threats

from Russia and China to become the leaders of emerging technologies.  President Biden

visualizes opportunities to reaffirm, to our allies, our commitment to stave off potential crises. 

He is now attempting to correct the foreign policy mistakes of the former administration and

hold foreign countries accountable for their actions.  But, this administration must repair its

rapport with allies to be able to exert collaborative efforts in maintaining world peace regarding

the development and use of AI, biotechnology, and cybersecurity.

V. Scope

Artificial intelligence, biotechnology, and cybersecurity impact the daily lives of every

American. Thus, the threats posed by each of these dual-use technologies is of critical

significance in all sectors of the country. Artificial intelligence has the power to make our work

more efficient and empower our enemies. Improved biotechnology capability could revolutionize

medicine and at the same time could be used to devastate crops or directly attack the health of

the American public with an engineered biological agent. Cybersecurity experts must constantly

balance how to develop countermeasures toward other countries while also shoring up potential

risks to our own systems. Protecting the ability of science to mature in a way that enables

innovation, encourages economic growth, maintains security, and encourages diplomacy is vital

to the long-term goals of the entire country.  

VI. Range

Artificial Intelligence--AI

Affirmative Ground

43

Page 45: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

In making the case that the U.S. and NATO should cooperate on AI against the backdrop

of rising AI competition, affirmative teams would be able to draw on a substantial body of

research and analysis arguing for greater transatlantic collaboration on AI strategy.

Specifically, experts have pointed to the digital, physical, and political security issues posed by

AI as ripe for more NATO cooperation.

Kasapoglu, Can (the director of the defense and security program at the Istanbul-based think-tank EDAM. D) and Baris Kirdemir (edam non-resident fellow).  “Artificial Intelligence and the Future of Conflict.” Carnegie Europe, November 28, 2019, https://carnegieeurope.eu/2019/11/28/artificial-intelligence-and-future-of-conflict-pub-80421

NATO would benefit from a convergence of transatlantic regulatory and legislative frameworks to better steer the trajectory of the coming transformation. In 2018, a consortium of U.S. and European experts from industry, civil society, and research institutions published a report that outlined three areas of concern.12 The first is the digital security domain, in which the report warned of potential AI vulnerabilities that would allow adversaries to stage large-scale, diversified attacks on physical, human, and software targets.

Second, in the physical security domain, the availability and weaponization of autonomous systems cause major challenges. Cyber and physical attacks on autonomous and self-driving systems and swarm attacks—coordinated assaults by many agents on multiple targets—are other potential threats.

Third, there are significant risks to political security. AI-enabled surveillance, persuasion, deception, and social manipulation are threats that will intensify in the near future. New AI capabilities may strengthen authoritarian and discriminatory political behavior and undermine democracies’ ability to sustain truthful public debates.

 NATO leaders themselves have signaled that they’re open to more cooperation on AI.

 “Cooperation on Artificial Intelligence will boost security and prosperity on both sides of the Atlantic, NATO Deputy Secretary General says.” NATO, October 28, 2020, https://www.nato.int/cps/en/natohq/news_179231.htm 

"There are considerable benefits of setting up a transatlantic digital community cooperating on Artificial Intelligence (AI) and emerging and disruptive technologies, where NATO can play a key role as a facilitator for innovation and exchange", said NATO Deputy Secretary General Mircea Geoană. On Wednesday (28 October 2020) he took part in a high-level virtual discussion on transatlantic cooperation in the era of AI, organised by the Atlantic Council's Future Europe Initiative and GeoTech Center.…

44

Page 46: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

"NATO is a natural platform for transatlantic cooperation of AI," the Deputy Secretary General underlined. “NATO offers its consultative mechanisms and unique networks for collaboration on defence and security questions. Bringing together Allies and partners, public and private sector, innovators and industry. We have great communities in areas like military capability development, science and technology, standardisation - and of course our Command Structure and military exercises. We also have new cross-cutting policy teams on Innovation Policy, who cover AI, and on Data Policy,” he pointed out.

Moreover, NATO is uniquely positioned to address the complex challenges posed by emerging

technologies, boasting defense capabilities, technological prowess, and an organizational

infrastructure well-suited to the new global reality.

Stavridis, James (ADM James G. Stavridis, former Commander, EUCOM, and NATO Supreme Allied Commander Europe). “Why NATO Is Essential For World Peace, According to Its Former Commander.” Time, April 4, 2019, https://time.com/5564171/why-nato-is-essential-world-peace/

For all those harbingers of trouble, though, by many traditional measures, NATO remains extremely healthy. It is powerful. The 29 nations of NATO produce more than 50% of the world’s gross domestic product, have well over 3 million troops on duty, operate massive combined naval fleets and air forces and together spend over $1 trillion on defense. Indeed, even with all the frustration over European defense spending not hitting the 2% of GDP goal, the collective European defense budget is the second largest in the world after the U.S.’s and is ahead of China’s and Russia’s–combined.It is smart. U.S. and European defense innovation and production provides a formidable military research and development capacity. Particularly in cybersecurity, unmanned vehicles, space operations, special-forces technologies, maritime and anti-submarine capability, and air and missile defense, NATO is a technology and education superpower.It is capable. The alliance boasts a large command structure of highly qualified teams of military officers from all of the 29 nations. Throughout Europe and the East Coast of the U.S., those teams prepare war plans, conduct training exercises, monitor readiness of allied units, gather intelligence about potential adversaries and run complex operations centers that cover the entire geographic range of NATO. These standing staffs, which we rationalized by reducing them 35% while I was NATO commander, can conduct prompt and sustained combat operations in a coalition structure on short notice.

In terms of advantages, affirmatives have much fertile ground to plow. On the economy,

for example, teams can point to analyses that international competition can act as a great

accelerant for economic innovation and growth (much as the U.S. competition with the Soviet

45

Page 47: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Union for space supremacy spurred a wide range of technological advances beyond the space

race itself).

Allison, Graham (Douglas Dillon Professor of Government, Harvard Kennedy SchoolMember of the Board, Belfer Center, Former Director, Belfer Center) and Eric Schmidt (former CEO of Google and a former executive chairman of Google and Alphabet, is Chair of the US National Security Commission on Artificial Intelligence). “Is China Beating the U.S. to AI Supremacy?” Belfer Center, August 2020, https://www.belfercenter.org/publication/china-beating-us-ai-supremacy

First, Americans must wake up to the challenge. Recognition that that the United States faces a serious competitor in a contest in which the outcome will be decisive for our future is necessary to get our competitive juices flowing. The Olympics offers an instructive analogy for thinking about a competitive strategy for AI. It also reminds us that competition is inherently a good thing. Competition produces superior performance. Participants in a marathon run faster than they do when running alone. Indeed, competition is a core American value. Free markets organize a competitive process that produces better products at cheaper prices. Science and its applications advance as research teams compete to better understand the world.

Additionally, affirmatives can argue advantages such as U.S. hegemony/global leadership,

international cooperation, nuclear war prevention – some experts have warned that unchecked AI

could pave the way to automated nuclear attacks (Straub, 2018) – national security, and more.

Negative Ground 

Negative teams would have a rich array of options for countering the affirmative. 

For example, experts have pointed to divergent U.S. and European interests on AI policy, which

could hinder effective transatlantic cooperation.

Soare, Simona R. (Sr. Assoc. Analyst @EUISS, focusing on US security policy, transatlantic security and EU-NATO relations). “Digital Divide? Transatlantic defence cooperation on Artificial Intelligence.” ISS European Union Institute for Security Studies, March 2020, https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%203%20AI_0.pdf  

The trouble is that Europeans have a different perspective on AI than Washington.29 Perhaps with the exception of France,30 Europeans view AI primarily through a geo-economic lens – as directly connected to their economic competitiveness. Many in Europe feel that, if left unaddressed, the European digital and AI technology gap will transform Europe into a ‘digital colony’.31 Reinforced by the White House’s transactional approach, by European concerns over their own competitiveness in the digital economy, and by Brussels’ fears of being pushed to the margins of US-China AI competition, there are pressing calls for Europe to

46

Page 48: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

defend its ‘digital sovereignty.’32 Others believe Europe has a strategic opportunity to advocate a veritable ‘third way’ on AI.33 The European Commission’s ‘digital package’ (released on 19 February) arguably goes a long way in this direction. 

Second, this suggests that a significant structural shift in the partnership is emerging. As President Macron has argued, the challenge in this technological competition is tied to sovereignty: ‘The battle we’re fighting [on AI] is one of sovereignty … If we don’t build our own champions in all new areas – digital, artificial intelligence – our choices... will be dictated by others.’34 The implication is that Europe’s digital vulnerability is becoming a geopolitical security problem, reinforced by pre-existing European dependencies, not least in defence. The expectation is that the US should help its European partners remain strategically relevant in the arena of great power competition in the new digital era.  

U.S. and European perspectives also differ on China, suggesting that it may be difficult for the

U.S. to rally its NATO allies behind an AI policy that will at least implicitly challenge China.

Germany, for example, has been a force for increased economic ties with China.

Vela, Jakob Hanke (trade reporter for POLITICO), Giorgio Leali (policy reporter for POLITICO), and Barbara Moens (Trade Reporter at POLITICO), “Germany’s drive for EU-China deal draws criticism from other EU countries.” Politico, January 1, 2021, https://www.politico.eu/article/germanys-drive-for-eu-china-deal-draws-criticism-from-other-eu-countries/ 

German Chancellor Angela Merkel's strong push to conclude the EU-China deal in the last days of the year has left a bad aftertaste among a group of EU countries who said they felt ignored.

Officials from Italy, Poland, Belgium and Spain criticized the way Germany pushed through the investment agreement with China in the final days of the German presidency of the Council of the EU, despite their warnings that the timing was tone deaf to slave labor concerns in China and risked alienating incoming U.S. President Joe Biden.

The officials said they felt steamrolled by Merkel and the "German engine" inside the European Commission, in particular Commission President Ursula von der Leyen and trade department director Sabine Weyand, who are both German.

“There’s a lot of frustration among smaller countries about the way the Commission has been used to push through one of Merkel’s pet projects at the end of her term and the end of her legacy,” said one EU diplomat.

“Is this the way the EU will work post-Brexit? The Brits are just out and we’re already missing their open market-oriented approach," the diplomat said. "If Germany weighs in too much, smaller EU countries have nothing to say."

47

Page 49: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The EU on Wednesday sealed a bilateral investment pact with China, allowing investors to acquire companies in a number of sectors, limiting joint venture requirements and allowing foreign employees to work in their respective markets.

But the critics worried that the deal was a political win for Chinese President Xi Jinping and came just as his government cracked down on democracy in Hong Kong, ethnic minorities in Xinjiang and journalists reporting on the origins of the coronavirus pandemic.

Disparate capabilities and interoperability challenges among member-states could also make a

cohesive NATO AI strategy difficult.

Pepe, Erica (Recruitment Evangelist with the Employer Insights Team), “NATO and collective thinking on AI.” IISS Blog, November 13, 2020, https://www.iiss.org/blogs/military-balance/2020/11/nato-artificial-intelligence

In some ways NATO might seem a natural forum for these deliberations, not least in a transatlantic context. It also has a lot of experience, going back to the Cold War, in working towards standardisation and interoperability among allies. However, the results achieved have been mixed, which underscores the challenges the Alliance now faces: not only 30 members with disparate levels of capability, but also a backdrop of rapid technological advances where some of its competitors and potential adversaries may hold significant advantages. Interoperability issues may be thorny, but they need to be resolved if AI-dependent capability gaps between members are not to widen. Early discussions regarding the establishment of common technical standards on the design and development of military-applicable AI would at least reduce this risk.

Given NATO’s potential pitfalls, negatives can offer alternative agent counterplans, including,

but not limited to a unilateral U.S. approach; the United Nations; a bilateral agreement between

the U.S. and China; and more.

What is more, negative teams can point to the issue of non-state actors exploiting AI,

which underscores how a state-based approach to AI won’t solve all concerns arising from its

security implications.

Straub, Jeremy (Assistant Professor in the Department of Computer Science at the North Dakota State University). “Artificial intelligence is the weapon of the next Cold War.” The Conversation, January 29, 2018, https://theconversation.com/artificial-intelligence-is-the-weapon-of-the-next-cold-war-86086

48

Page 50: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Countries might agree to a proposed Digital Geneva Convention to limit AI conflict. But that won’t stop AI attacks by independent nationalist groups, militias, criminal organizations, terrorists and others – and countries can back out of treaties. It’s almost certain, therefore, that someone will turn AI into a weapon – and that everyone else will do so too, even if only out of a desire to be prepared to defend themselves.

An alternative would be to argue that the discourse around AI as a security threat is overblown.

Fears of killer robots, for example, have been dismissed by many experts.

Berlatsky, Noah (Blog Editor at Prostasia Foundation). “Is AI dangerous? Why our fears of killer computers or sentient 'Westworld' robots are overblown.” NBC News, December 6, 2018, https://www.nbcnews.com/think/opinion/ai-dangerous-why-our-fears-killer-computers-or-sentient-westworld-ncna943111 

Malevolent robots are fun monsters, like vampires or aliens. But, like vampires and aliens, they're not real, according to "The AI Delusion," a new book by Pomona College Economics professor Gary Smith. According to Smith, computers aren't smart enough to threaten us — and won’t be for the foreseeable future. But if we think computers are smart, we may end up harming ourselves not in the far future, but right now.Computers seem more intelligent than us because they can perform certain tasks much better than we can. "People see computers do amazing things, like make complicated mathematical calculations and provide directions to the nearest Starbucks, and they think computers are really smart," Smith told me in a phone interview. Computers can memorize huge amounts of information — a computer has effectively solved the game checkers, calculating every possible move, so that it is unbeatable. If computers can beat humans in games of skill and intelligence, then computers must be more intelligent than humans are. And if they are more intelligent than us, it follows that they pose a danger to us. Right?

This reasoning is not right, according to Smith. Computers can calculate and memorize, but that doesn't mean they're smarter than humans. In fact, computers are, in most respects, no smarter than a chair. They don't have wisdom or common sense. "They have no understanding of the real world," Smith says.

Additionally, negatives can put forward disadvantages including the economy, by pointing to

research indicating that excessive state involvement in technology policy could constrain

innovation and undermine U.S. economic competitiveness; China relations, arguing that an

aggressive, security-based approach to countering China on AI could make greater conflict a fait

accompli; and numerous tradeoff disadvantages, given that increased international cooperation

on AI could detract focus from other critical challenges, including climate change, food

insecurity, democracy and human rights, and more. 

49

Page 51: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

There is also an abundance of Kritik ground for negatives to explore. Negatives can attack

the securitized rhetoric employed to discuss AI in the global arena; argue Kritiks including

racism or Orientalism; make Capitalism Kritiks, given how much of what is at stake in the global

AI competition are profits for major technology companies and government contracts for tech

firms; and more.

Biotechnology

Affirmative Ground

In the early 2000’s, bioterrorism was a hot topic. The images of the 9/11 attacks were

fresh in the minds of Americans when purported anthrax attacks began appearing in the news the

week after the World Trade Center towers were hit. This incident made the idea of a biological

attack on American soil tangible. Since that time, scientific advances in biotechnology have

evolved. Gene editing presents the possibility that terrorists could design a deadly pathogen from

organic or synthetic materials.

West, Rachel M. (Postdoctoral Associate at the Johns Hopkins Center for Health Security and the Johns Hopkins Bloomberg School of Public Health), and Gigi Kwik Gronvall (Senior Scholar at the Johns Hopkins Center for Health Security and an Associate Professor in the Department of EHE), “CRISPR Cautions: Biosecurity Implications of Gene Editing.” Perspectives in Biology and Medicine, vol. 63, no. 1, 2020, pp. 73–92., doi:10.1353/pbm.2020.0006.

The potential for CRISPR to revolutionize genetic engineering also raises concerns that it could increase biosecurity threats by lowering barriers for the development of biological weapons. The ability to rapidly modify a genome at relatively low cost compared to previous methods could make CRISPR systems attractive for nefarious actors at all levels, from individuals through nation states. In the realm of biosecurity threats, CRISPR may be misused to create increased-virulence pathogens, neurotoxins, and even de novo organisms (DiEuliis, Berger, and Gronvall 2017; DiEuliis and Giordano 2017). A de novo organism would be completely synthetic, although it may have the same genome as an existing pathogen like smallpox. Creating a completely novel organism using synthesis is theoretically possible, but it is likely to require extensive training, funding, and time for research and development, which is less possible for some types of actors (Gibson et al. 2010). A recent National Academies of Sciences, Engineering, and Medicine study, Biodefense in the Age of Synthetic Biology (2018), was undertaken to develop guidance on evaluating

50

Page 52: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

biosecurity risks associated with new biotechnology. The authors categorized potential threats by level of concern and offered potential solutions or safety measures that could reduce the risk of a certain technology. The authors recommend that the US Department of Defense, who requested this study, continue to innovate and engage in biotechnology, but that an assessment framework should also be used to examine novel biotechnology and its potential broader applications in the scientific and public spheres. The authors also categorized potential risks by relative concern, identifying the re-creation of known pathogens, such as smallpox, as among the highest of concern, while rating the creation of a novel pathogen as a lower risk. CRISPR could allow for rapid, efficient editing of a pathogen to possess the virulence factors of another pathogen, or it could allow a researcher to recreate a known pathogen whose genome is published. Given these biotechnology areas of concern, the misuse of CRISPR warrants recognition as a potential biosecurity threat.

The gene drive technology that promises benefits to health and agriculture could also be

engineered to create devastation for crops or directly used against human populations. The

technology can be very unpredictable and this poses a wide array of threats to the United States. 

Scudellari, Megan (freelance science writer and journalist based in Durham, North Carolina, specializing in the life and environmental sciences). “Self-Destructing Mosquitoes and Sterilized Rodents: the Promise of Gene Drives.” Nature News, Nature Publishing Group, 9 July 2019, www.nature.com/articles/d41586-019-02087-5. 

Another concern is that gene drives have the potential to alter entire populations and therefore entire ecosystems. They could also, in theory, negatively affect human health by causing the malaria parasite to evolve to be more virulent or to be carried by another host, says molecular biologist and bioethicist Natalie Kofler. She is the founding director of the Editing Nature group at Yale University in New Haven, Connecticut, which aims to address environmental genetic technologies worldwide. “This technology has the potential to be immensely powerful and to change the course of things that we may not be able to predict,” says Kofler.

Another threat the U.S. faces is biotech espionage from competing nations like China. While this

type of threat may not result in an attack, it could harm the United States in economic ways.

These threats are uniquely difficult to prevent since eliminating the threat could also remove

opportunities for collaboration and innovation.

Moore, Scott (political scientist and administrator at the University of Pennsylvania).  “In Biotech, the Industry of the Future, the U.S. Is Way Ahead of China.” Lawfare, 17 Feb. 2021, www.lawfareblog.com/biotech-industry-future-us-way-ahead-china.

51

Page 53: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The U.S. biotechnology sector also faces other threats, not least growing espionage and intellectual property theft by foreign actors, especially those linked to China. Several high-profile cases brought by the U.S. Department of Justice’s China Initiative have involved biotechnology researchers, and American biotech firms have been top targets for cyber theft and intrusion. Sustained outreach to researchers and research institutions is critical to preventing such theft. But efforts to clamp down on the threats posed by espionage and intellectual property theft can easily go too far and must preserve the researcher mobility and data-sharing that is essential to doing cutting-edge science.

Therefore, it may be critical that the international community act in multiple ways to

address this threat. One way to address these threats is through the development of a framework

for the use of biotechnology.

Dieuliis, Diane (Sr. Research fellow at National Defense University), and James Giordano (Prof. of Neurology and Biochemistry, and Chief of the Neuroethics Studies Program of the Pellegrino Center for Clinical Bioethics at Georgetown University). “Gene Editing Using CRISPR/Cas9: Implications for Dual-Use and Biosecurity.” Protein & Cell, vol. 9, no. 3, 2017, pp. 239–240., doi:10.1007/s13238-017-0493-4.

We propose that agreed-upon international, ethical “norms” for human modification for therapeutic purposes are relevant and applicable to any such use of this technique. Kang et al (2017) advocate international standards of ethics, and note efforts made to date by the National Academies (2017) in this regard. We concur with the need for international ethical standards and guidelines, and also note the need for more engaged discourse to define the needs, values and ethical system(s) and principles to be employed (Palchik, Chen, and Giordano, 2017; Lanzilao, Shook, Benedikter, and Giordano, 2013) Furthermore, in recognition of the potential risk/threat posed by genetic modification, we strongly endorse involvement of the Biological Toxins and Weapons Convention (BTWC), in order to ensure inclusion of biosafety and biosecurity communities in any such deliberation and determination of standards. Templates may exist and could be consulted for the development of international norms and best practices through engagement of expertise in technical aspects of emergent technology and security fields (Talinn Manual, NATO, Carnegie Endowment 2017). Expanding the scope and platform of international dialogue can be instrumental to ensuring that all aspects of emerging biotechnological tools and methods are evaluated for their potential to be weaponized or used in other ways that threaten public safety (Gerstein and Giordano, 2017).

Another route for dealing with biotech threats is the development of countermeasures. For

example, DARPA is currently involved in developing gene drives to counter possible damaging

ones that could be released into crops and animal populations.

52

Page 54: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

West, Rachel M., and Gigi Kwik Gronvall. “CRISPR Cautions: Biosecurity Implications of Gene Editing.” Perspectives in Biology and Medicine, vol. 63, no. 1, 2020, pp. 73–92., doi:10.1353/pbm.2020.0006.

Attempts to use gene drives to decimate crops or impact local resources could present a biosecurity threat that could have a wide range of consequences. Keeping this in mind, the Defense Advanced Research Products Agency (DARPA) created the Safe Genes Project to not only address potential issues in gene drive technology and biosecurity, but to also promote defensive research to create countermeasures (DARPA 2017). Seven research teams are funded by the project, with each having an overall goal of (1) developing genetic tools to provide better control of gene drives; (2) creating drug-based treatments to reverse or prevent effects of gene drives; or (3) identifying ways to mediate gene drive impacts on ecosystems. This cooperative effort between government and scientists is an excellent example of forward-thinking research that helps support gene drive research by making it safer and more responsible.

Also, the United States could develop better export controls to manage the materials transported

to other countries that might be used for bioweapons.

Moore, Scott. “In Biotech, the Industry of the Future, the U.S. Is Way Ahead of China.” Lawfare, 17 Feb. 2021, www.lawfareblog.com/biotech-industry-future-us-way-ahead-china.

Beyond its shores, t he United States should work with its partners and allies to enhance export controls on dual-use biotechnology—used for both peaceful and military gain—especially DNA templates. Many forms of genetic material and synthetic biology products are already subject to U.S. export controls, but gaps remain, and screening for genetic sequence orders relies primarily on voluntary regulation by biotech firms. Better coordinating export controls among major economies and U.S. allies can dramatically reduce the risk of sophisticated bioweapons development in the decades to come. When it comes to biotechnology, the industry of the future, the U.S. remains well ahead of its rivals, including China. That’s something Americans can, and should, take pride in. But the U.S. must make proactive investments and undertake significant reforms now to ensure that things stay that way.

Indeed, there is a growing consensus that emerging technologies like gene editing must be a part

of the National Defense Strategy and it should include international institutions.

Sherman, Justin (nonresident fellow at the Atlantic Council’s Cyber Statecraft Initiative. He is also an op-ed contributor at WIRED and researches at the Tech, Law, & Security Program at American University Washington College of Law and at Lawfare’s Trustworthy Hardware and Software Working Group) and Evanna Hu. “How the next National Defense Strategy Can Get Serious about Emerging Technologies.” Atlantic

53

Page 55: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Council, 19 Feb. 2021, www.atlanticcouncil.org/blogs/new-atlanticist/how-the-next-national-defense-strategy-can-get-serious-about-emerging-technologies/.

The next NDS should include sophisticated, nuanced strategies for emerging technologies based on the maturity of the technologies along a spectrum. It should feature distinct strategies for already-emergent technologies such as AI, and for emerging technologies such as CRISPR gene editing and quantum computing. It should take an inclusive approach that integrates the perspectives of the commercial sector and civil society from the start, as opposed to the government outlining strategies and values before engaging with other sectors. And it should involve collaboration with international institutions on standards, ethics, and frameworks to ensure that US values governing these technologies align with the values of democracy and the international community, and that US technological capabilities are interoperable with those of its partners and allies.

 This leads to the question of what international institution would be best equipped to deal

with the challenges of emerging biotechnology. One possibility is the North Atlantic Treaty

Organization. As their 2018 “Framework for Future Alliance Operations” suggests, they are

keenly aware of the threats posed by emerging technologies.

NATO. “Framework for Future Alliance Operations.” North Atlantic Treaty Organization, 2018, https://www.act.nato.int/images/stories/media/doclibrary/180514_ffao18.pdf 

The future will likely bring a wide range of new threats coming from emerging technology or from new, creative, and innovative tactics, techniques, procedures, capabilities, or doctrine. Without incurring the cost of research and development, hostile actors can capitalise on technological advancements and translate them into capabilities that threaten the Alliance. Examples of areas where technology could revolutionise warfare are sub-surface and subterranean operations, swarm techniques, space based weapons, directed energy, autonomous systems and sensors, quantum computing, unmanned systems, electromagnetically launched projectiles, renewable energy, artificial intelligence, additive manufacturing/3D printing, biotechnology and nanotechnology. Forces must be able to identify, monitor and understand these new threats, and develop protective measures.

NATO as a security organization might be in the best position to partner with the United States

on the security threats presented by emerging technologies. They are in many ways uniquely

situated to help negotiate the limits of the technologies and simultaneously initiate the

cooperation needed to stay on the cutting edge needed for leadership and security.

54

Page 56: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Murray, Rob. “Building a Resilient Innovation Pipeline for the Alliance.” NATO Review, 1 Sept. 2020, www.nato.int/docu/review/articles/2020/09/01/building-a-resilient-innovation-pipeline-for-the-alliance/index.html.  Today, NATO’s competition is a global one and the race is one of technological adoption – that is, the acceptance, integration and use of new technology in society. From artificial intelligence to quantum and everything in between, governments are in a race to leverage these technologies at scale and speed – first adopter advantage for emerging disruptive tech could not be more prevalent in the world of geopolitics and deterrence. Indeed, the nations that win this race may be those with the most agile bureaucracy rather those with the best technology. In contrast to the Cold War, the United States and its NATO Allies are unlikely to simply outspend others. In a post-Covid-19 world, rebalancing public finances could see f urther financial pressure placed on Allied defence budgets. We now need a different advantage, one which will deliver in the short term and build resilience over the longer term – more defence at less cost with least delay. This starts with our people, their creativity, education and access to funding. It ends with a robust pipeline of new dual-use (civil and military) technologies constantly being created, commercialised and capitalised upon. The Alliance’s transatlantic nature places it in a unique position within the international order to provide both demand-side policies and supply-side resources that can genuinely build such a pipeline, creating not only innovations but entirely new markets – as Eisenhower noted: the foundation of military strength is economic strength. Recent history would suggest, the model of democracy and Allied governments’ willingness to make big bets on mission-oriented technology does indeed create new markets and it is this model, underpinned by shared values, which will be key to NATO’s longer term success.

With the US, NATO could play a vital role in reacting to biological threats in the future. As the

Coronavirus pandemic has shown, biological threats found in nature are just as likely to decimate

countries as man-made pathogens. There is clearly a need for more international cooperation and

alignment in dealing with biological threats and this could be achieved through a US-NATO

partnership in the area of vaccines.

Paun, Carmen (writer, Politico), and Ryan Heath (Sr. editor, Politico). “How the Coronavirus Can Prepare Us for Bioterrorism.” POLITICO, 24 July 2020, www.politico.com/news/2020/07/24/how-to-prepare-for-bioterrorism-courtesy-of-coronavirus-380689.

Whether it comes from natural causes or from an enemy, the crippling effects of a new virus are the same, said Stefano Stefanini, a former Italian ambassador to NATO, now head of the Brussels office of Project Associates, a consultancy. Stefanini thinks NATO should have reacted to coronavirus in the same way it would react to a biological attack, he said. I n the future, the defense alliance should consider how to help its members better prepare

55

Page 57: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

for this kind of emergencies, maybe as part of their defense spending budget , he said. When a vaccine would be approved, NATO could play a significant role by using its logistics to help deploy it to member countries and maybe to other countries, as well, Stefanini said. NATO Spokeswoman Oana Lungescu rejected this criticism, saying the organization is not the first responder in these situations. That’s up to nations, but NATO can use its capabilities to support them , she said.

Vaccine diplomacy from the US has lagged, so far during the pandemic, but a new NATO

partnership could invigorate US soft power and leadership.

Prasad, Kislaya (research professor at Smith School and a guest scholar at the Brookings Institution). “Unless the U.S. changes its vaccine policy, the world will look at us like hoarders.” Fortune.com 4/4/2021

But even if one were to discount the importance of soft-power diplomacy, the Western response is incomprehensible for at least three reasons. First, the hoarding of vaccines does not help the West fight COVID-19 . So long as the pandemic continues to rage around the world, new coronavirus variants resistant to existing vaccines are likely to arise and spread globally. Second , vaccine nationalism has adverse economic effects . In an interconnected global economy, if large parts of the world remain devastated by the pandemic, the impacts are felt elsewhere. Finally, the pandemic has elevated global public perceptions of the Chinese and Indian pharmaceutical sectors’ capabilities, possibly at the expense of U.S. pharma companies. Moreover, less-developed countries now know that in the event of another global health crisis, they are essentially on their own, and need to invest in domestic capabilities. U.S. leadership during past global crises has cemented its standing and influence in the world, and furthered its geopolitical and economic interests. It is past time for the U.S. to do the same in its vaccine diplomacy. Vaccinating the world’s population must become an American priority.

Negative Ground

While it is easy to imagine a catastrophic event involving biological weapons, it is much

more difficult to actualize that event. While affirmative teams will have the ability to describe

the magnitude of potential impacts from biological attacks they are also under the burden to

prove their probable use which will be a greater challenge. This will help level the playing field

for the negative team. 

Vogel, Kathleen M. (associate professor in the School of Public Policy, University of Maryland, College Park, and a Senior Fellow at CISSM), and Sonia Ben Ouagrham-Gormley (George Mason University   GMU, Dept of Public and Internat’l Affairs).

56

Page 58: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

“Anticipating Emerging Biotechnology Threats: A Case Study of CRISPR.” Politics and the Life Sciences, vol. 37, no. 2, 2018, pp. 203–219., doi:10.1017/pls.2018.21.

With all of the foregoing said, however, let us assume that one is able to reliably and accurately mutate a pathogen using CRISPR or one of its gene-editing variants. This does not mean that one automatically has a biological weapon . Creating a mass-casualty biological weapon requires more than mere access to a pathogen, a particular technique, or a piece of biotech equipment — although all of these are important components. To create a potent bioweapons capability, there are a variety of technical issues that must be addressed. First, one must acquire access to a virulent pathogen or toxin — CRISPR may allow one to create a lethal, or more lethal, variant of a pathogen or toxin, but this is not without problems. As noted earlier, the Soviet Union learned the hard way that even though they created a highly antibiotic-resistant strain of tularemia bacteria, it was so environmentally sensitive that it could not survive in the environment. Therefore, merely being able to genetically engineer a pathogen did not ensure a viable bioweapons capability. Also, one still has to overcome other hurdles. Unless one creates a highly infectious agent, a would-be terrorist would have to determine how to produce larger quantities of the agent . Production in larger batches is not as trivial as growth of an agent in a petri dish. The former Soviet Union experienced difficulties in scaling up its bioweapons agents in new facilities. 116 Along with production, one also has to think about how to protect the agents to survive in the environment, as many biological agents and toxins can be environmentally sensitive. The processing of agents is a key challenge in developing a bioweapons capability — the United States, Russia, and Iraq all encountered problems in creating special formulations to stabilize their bioweapons agents. 117 One then has to find an appropriate delivery form of the material (e.g., liquid or dry), which can also pose challenges for viability, and then employ an appropriate delivery device under the right conditions. Former U.S. bioweaponeer Bill Patrick has noted, “You can have the best agent in the world, but the physics of dissemination mean that unless you have good conditions and with a good delivery system to get that improved agent on target, you’re going to fail.” 118 Past state and nonstate bioweapons programs have shown that addressing these factors requires knowledge, specialized skills, and management and organizational expertise, as well as materials, infrastructure, and equipment. Therefore, the important takeaway here is that gene editing is only one small component of an entire process required to produce lethal biological weapons. Unless gene editing (or other science and technology developments) can be shown empirically to alter the other factors of bioweapons development, technical hurdles will remain. This also points to the need to look not only at gene manipulation but also at all of the other factors shaping production, processing, and delivery of bioweapons agents in threat assessments. 

Also, the regulation of biotechnology could have unforeseen impacts on innovation and

economic development. Groups that invest in emerging technologies in the biotech industry may

see a foreign policy aimed at controlling biotech use as hostile to free market capitalism.

National Venture Capital Association. "Emerging Technology Definition Must Protect American Innovation." States News Service, 11 Jan. 2019. Gale Academic OneFile Select, link.gale.com/apps/doc/A569194284/EAIM?u=ksstate_wichita&sid=EAIM&xid=fa626305.  

57

Page 59: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The National Venture Capital Association (NVCA) recently made formal recommendations in the Commerce Department's rulemaking process to define so-called "emerging technologies" that will be subject to export controls. These newly defined emerging technologies will also feed directly into the Foreign Investment Risk Review Modernization Act (FIRRMA) process, and certain investments into these types of companies may trigger a CFIUS filing. In announcing the comment period, Commerce asked for feedback on 14 categories that includes AI/machine learning, 3D printing, biotechnology, and several other technology areas that are major focuses of U.S. startups and venture investment. "American innovation could be seriously hampered unless the Commerce Department acts with precision in classifying emerging technologies," said Bobby Franklin, President and CEO of NVCA. "A targeted approach is needed in this rulemaking. By categorizing only those technologies that have significant defense uses and not those that merely have broad commercial implications or incidental national security significance as emerging technologies, the government can ensure the impact on American scientific and technological advancement is minimized while still protecting important national security interests." In its submission, NVCA emphasizes three key points: (1) Venture capital is the single largest driver of emerging U.S. company innovation and draws on capital and talent from across the world. An overbroad definition of emerging technologies (thus an overbroad application of FIRRMA) may have devastating consequences for the innovation economy . (2) Many of the representative general categories of technologies listed in the request for comments are not yet well-defined. Because technologies that could be deemed to fall into those categories are widely used across many emerging technology companies, a broad set of controls could sweep in many unintended target companies and technologies. (3) The case for investing in many U.S. emerging technology companies relies in many circumstances on their ability to find talent and worldwide commercial markets for their innovative products. To the extent that the new rules prevent U.S. companies from accessing that talent and those markets, global venture capital may well redirect to innovators in other nations. In addition to NVCA's comments to the Commerce Department, it has also provided input to the Treasury Department about its pilot program under FIRRMA. On November 7, NVCA filed comments that asked for clarification in ten areas that have caused unneeded confusions for venture capitalists and high-growth startups.

The last four years of America First has made many countries wary of relying on the

United States. While Biden may be ready to initiate conversations around partnership that does

not mean our allies will so easily fall back in line. For example, France’s president signaled

Europe must build its own defense capabilities to avoid its security dependence on the US:

Sanger, David E. (Adjunct Lecturer in Public Policy, is the Chief Washington Correspondent of The New York Times). , et al. “Biden Tells Allies 'America Is Back,' but Macron and Merkel Push Back.” The New York Times, 20 Feb. 2021, www.nytimes.com/2021/02/19/us/politics/biden-munich-conference.html.  But Mr. Macron , speaking in English to answer a question, also argued that Europe could not count on the United States as much as it had in past decades. “We must take more of the burden of our own protection,” he said. In practice, it will take many years for Europe to build up a defense arm that would make it more self-reliant. But Mr. Macron is determined to start now, just as

58

Page 60: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

he is determined to increase the European Union’s technological capacities so that it can become less dependent on American and Chinese supply chains. Mr. Biden, in contrast, wants to deepen those supply chains — of both hardware and software — among like-minded Western allies in an effort to lessen Chinese influence. He is preparing to propose a new joint project for European and American technology companies in areas like semiconductors and the kinds of software that Russia exploited in the SolarWinds hacking.

If anything, the last four years taught our partners they must be ready for anything come 2024

and if that is a second term for Trump or Trump 2.0, a U.S. partnership may not be worth the

paper it is printed on.

In addition, there are ample avenues outside of a NATO partnership for negative teams to

access benefits. The U.S. could partner with the World Health Organization, the United Nations,

The International Monetary Fund, or any international organization to support or regulate biotech

development or use. Also, the negative team could propose a bilateral partnership with an

individual country to form a biotech alliance. This would provide a clear contrast to the

affirmative team while still accessing advantages from the resolution. 

Negative teams could argue that there are substantial disadvantages to cooperating with

NATO on biotechnology. One disadvantage would be the potential backlash from countries like

China and Russia. While the policy would certainly be designed to contain these two countries, it

could create a more dangerous situation if China and/or Russia view the policy as aimed directly

at them. This may result in an escalation of tensions between the West and Russia and/or China.

These countries are currently cooperating on a Space Program. What if the U.S. cooperation with

NATO on biotechnology solidifies these two powerful countries together on another

technological front? China is also still aggressively seeking control of the South China Sea. Will

this policy make it more difficult for the US to address issues with China on other matters like

the South China Sea dispute?

59

Page 61: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Cybersecurity

Affirmative Ground

The complexity of computer networks and the difficulty of preventing, detecting,

responding to, and recovering from a cyber-attack make it nearly impossible for any single

country to develop an effective unilateral approach to cybersecurity. While the U.S. has long

been a global leader in cybersecurity, a decades’ long policy focusing on Offensive Cyber

Operations (OCO’s) through covert NSA acquisitions as a national policy, as opposed to a

comprehensive national security policy focused on defensive cyber security, left our government

and businesses’ cyber networks vulnerable to exploitation by private hackers, transnational

criminal organizations, and those supported by national governments.  Post-Trump, the hacking

and release of CIA hacking tools by Wikileaks eliminated any offensive advantage of U.S.

government hackers and left the Biden Administration scrambling to create new digital security

solutions.

Riley, Tonya."The Cybersecurity 202: NSA director says intelligence has a big[PM1]  blind spot: domestic Internet activity."  Washington Post, 3-26-2021. https://www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-says-intelligence-has-big-blind-spot-domestic-internet-activity/#click=https://t.co/kg8XkfRoXH

A judge rejected a request by an ex-CIA employee to dismiss charges of leaking hacking tools. A judge denied former CIA employee Joshua Schulte’s bid to dismiss espionage charges on the grounds that the grand jury that indicted him did not have enough Hispanic or Black individuals, Larry Neumeister of the Associated Press reports. A trial for Schulte, who is accused of leaking CIA hacking tools to WikiLeaks and has pleaded not guilty to all charges, is expected to begin in October after a jury deadlocked last year . WikiLeaks’ 2017 release of the hacking tools was one of the most significant leaks in the CIA’s decades-long history and laid bare the agency’s hacking and surveillance methods . The Biden administration is readying an executive order to require companies to disclose breaches to U.S. government clients. A draft version of the order would also require companies to keep more records for investigations of the breaches and work with federal agencies as they respond, according to Reuters’s Christopher Bing, Nandita Bose and Joseph Menn. The order could be made public as early as next week, they write. The executive order comes as the Biden administration plans its responses to the devastating SolarWinds and Microsoft Exchange hacks . A National Security Council spokeswoman told Reuters no decision has been

60

Page 62: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

made on the final content of the executive order. Anne Neuberger, the deputy national security adviser for cyber and emerging technology, previewed the executive order earlier this month, when the government was still primarily grappling with SolarWinds. Neuberger said at the time that t he executive order would “focus on building in standards for software, particularly software that’s used in critical areas.”

Additionally, the U.S. is confronting a more pressing challenge regarding the SolarWinds hack

of the Microsoft Exchange servers, and the recent cyber-attack on our energy infrastructure,

Colonial Pipeline.  Our adversaries are using our own weapons against us.  Unfortunately, the

U.S. did not catch this attack, and a global cyber-security firm alerted the world to the attack .

  The Advanced Persistent Threats (APT) to global computer networks left vulnerable the

most critical infrastructure systems:  supply chains, providing the public with everyday goods

and resources, electrical grid systems, medical facilities, global financial systems, and command

and control (C2) weapons systems, the backbone of militaries across the world.  APT’s are

typically carried out by individuals with ties to or working directly with nation states, although

attribution remains problematic.

A failure of the U.S. to act in response to these threats could indicate the danger of falling

woefully behind other developed nations in the areas of technology and emerging threats facing

the world.  The fear of failure is driving the Biden administration to draft aggressive executive

actions to confront the challenges, and to propose significant funding increases for the U.S.

Cybersecurity and Infrastructure Agency (CISA), decimated by the previous administration and

John Bolton, NSA advisor.  Biden spoke directly to the involvement of the Russian government. 

Senate members, including ranking Democrats, echo Biden’s call for action, and indicate Russia

must bear the consequences of their cyber belligerence, and the global community must establish

better rules of conduct and consequences in cyberspace. It is crucial the American public

61

Page 63: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

understand this growing threat, so they will support political changes needed to protect our

country.

Because the threats are not unique to the U.S., and because our government does not have

the ability to resolve cybersecurity threats without cooperation from allies and members of the

global community, international actions are warranted and required.  NATO is stepping up to

take the lead to create global solutions to protect all citizens across the globe.  Since 2016,

NATO has taken steps to create frameworks for its members to prevent global conflict and

resolve cyber threats from both state and non-state actors.  NATO is committed to examining the

specific challenges brought by cyber threats.  The cooperative framework that exists within

NATO provides the international community with the tools and resources to address cyber

threats.  Individual states, alone, cannot resolve this global challenge.

NATO. "Joint press conference by NATO Secretary General Jens Stoltenberg with the EU High Representative for Foreign Affairs, Federica Mogherini." NATO, 12-6-2016. https://www.nato.int/cps/en/natohq/opinions_138729.htm

Good afternoon. We have just finished a meeting where we addressed the cooperation between NATO and the EU. And the meeting was attended by High Representative / Vice President Federica Mogherini and with the Minister from Sweden and the Ambassador of Finland, so in addition to the 28 members of the Alliance and Montenegro, we also had representatives of the European Union present at the meeting. And it’s always a good pleasure to welcome you to NATO, Federica, especially when we are able to agree on such a substantial list of measures to take our cooperation forward. And we have been working together on how to strengthen and how to enhance the cooperation between NATO and EU for a long time, so therefore I think today we really mark a milestone in our efforts to build our cooperation and to strengthen the partnership between NATO and the EU. The security of Europe and North America is interconnected. A stronger NATO is good for the EU and a stronger EU is good for NATO. And strengthening our strategic partnership is more important than ever. First, we all face new threats and new security challenges, which combine military and non-military means of aggression. Such as hybrid, cyber, terrorism. And neither NATO nor the EU has the full range of tools to respond to these challenges, so therefore we have to cooperate. Second, the EU is taking steps in strengthening European defence, which we welcome. It is important that these steps are complementary with NATO efforts. And third, the strength of the transatlantic bond is vital to our security. Strong ties between NATO and the EU bring North America and Europe closer together. In Warsaw in July, I signed a Joint Declaration with Presidents Tusk and Juncker. We said at the time that we had never done so much together. Now we are going to do even more together. We have identified over forty proposals in several key areas. They are pragmatic, but they are ambitious. On hybrid, we agreed on concrete measures to increase situational awareness. And to bolster our nations’

62

Page 64: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

resilience. On maritime, we enhanced cooperation between Operations Sea Guardian and Sophia in the Mediterranean. Through logistical support and information sharing. On cyber, we will strengthen our mutual participation in exercises, and foster research. NATO and the EU will also work more closely together to build the capacities of our partners.

Through the development of effective policies to create new cyber defenses and an

internationally agreed upon framework for conduct and conflict in cyberspace, the NATO actor,

in this resolution, creates a discussion of advantage areas that give affirmative teams a diversity

of options to debate.  Intrinsic to this topic will be discussions of the changing relationship of the

global superpowers, as well as nations whose extensive cyber capabilities create new power

dynamics in a globalized world.  The relationships between the U.S., Russia, China, and the EU

are central to this topic and allow the affirmative to look at specific avenues to create cooperation

between actors and help build on global efforts to deter conflict.  

Stoltenberg, Jens (NATO Sec. General). "NATO and Cyber: Time to Raise our Game." Defense News, 7-28-2016, https://www.defensenews.com/smr/road-to-warsaw/2016/07/08/nato-and-cyber-time-to-raise-our-game/

We may not see it but, in the realm of cyberspace, our countries are under attack every single day. A few years ago it was cyber-attacks on financial institutions that made the headlines. Today, it is attacks on critical networks and infrastructures – disrupting services and, in some cases, bringing modern life to a grinding halt. In fact, what was once a nuisance has become a strategic challenge. Two years ago, a cyber-attack temporarily blocked access to NATO headquarters' website. Recently, a series of cyber-attacks was launched against German state computer systems, including to gather intelligence on critical infrastructure such as power plants. And in Ukraine, cyber-attacks have been used as a weapon of so-called "hybrid" warfare. States and non-state actors are increasingly using cyber-attacks to achieve their diplomatic and military objectives. So two years ago, NATO allies acknowledged that the impact of cyber-attacks could be as harmful to our societies as a conventional attack and made clear that cyber defense is part of the alliance's core task of collective defense. Cyber-attacks can also seriously undermine NATO's missions around the world. Our forces are increasingly likely to operate in environments where adversaries use cyber-tools to disrupt our decision-making. To ensure that NATO can do its job of protecting its citizens and territory against any threats, we have to be just as effective in the cyber domain as we already are on land, in the air and at sea.

63

Page 65: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

At the heart of this discussion is the crucial issues of evolving power dynamics as the world

transitions from a post-cold-war alignment to a world of emerging powers whose fates seemed

destined for conflict.  The affirmative can access an ever-growing body of literature that explores

cooperation in this new multilateral world, and the manner in which the U.S. and other actors

should engage with each other as alliances transition and shift with the reality of a changing

world.  NATO is a defensive alliance committed to its mission of protecting its member nations’

citizens and their territory.  NATO is the appropriate actor because of its commitment to strict

adherence to international law.  NATO’s values ensure the  coalition is best suited to create a

peaceful cyberspace world in the future. 

Stoltenberg, Jens. "NATO and Cyber: Time to Raise our Game." Defense News, 7-28-2016. https://www.defensenews.com/smr/road-to-warsaw/2016/07/08/nato-and-cyber-time-to-raise-our-game/

For all that NATO is doing to adapt to a changing world, one thing will never change: we are a defensive alliance, whose mission is to protect NATO's citizens and territory, and whose actions will always be proportionate and in strict accordance with international law. That, in turn, means that we strongly support efforts to foster a more transparent and secure cyberspace, through the development of voluntary norms of behavior by individual states and related confidence-building measures. NATO is founded on the shared values of liberty, democracy, human rights and the rule of law. That is why we are determined to ensure that cyberspace remains the place for peaceful, open communication and debate that we all need it to be.

Within this discussion, affirmatives have the ability to take theoretical positions to

support the resolution to create strong debates, including the role of U.S. hegemony in a post-

Trump global world, the role of the NATO alliance in the modern world, the effectiveness of

deterrence in cyberspace, and the effectiveness of offensive versus defensive cyber policies.

Within the broader discussion of NATO and geopolitics that this resolution brings, is the manner

in which our global economy functions interdependently, and the vulnerabilities of multiple

industries to cyber-attacks threatening the safety and security of populations across the world. 

At the heart of this topic, the affirmative has access to explore the specific effects of cyber-

64

Page 66: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

attacks on key areas of the global economy including: banking and finance, health care, energy

security, transportation infrastructure (ports and shipping), military and defense, aerospace, and

the emerging technology industry. Regardless of enemy provocations, NATO is the appropriate

leader in cyber defense because it is committed to creating peaceful outcomes with adversaries

by avoiding conflict.  NATO has the ability to create the environment for dialogue though the

creation of credible cyber deterrence.

Stoltenberg, Jens. "Press conference by NATO Secretary General Jens Stoltenberg following the meeting of the North Atlantic Council at the level of Defence Ministers." NATO, 2-16-2017.   https://www.nato.int/cps/en/natohq/opinions_141340.htm JENS STOLTENBERG (NATO Secretary General):  We will continue to work for dialogue with Russia. We don’t want to isolate Russia, we don’t want a new cold war, we are working for a more constructive relationship with Russia and we will continue to do exactly that. But of course our dialogue with Russia has to be based on some core principles, the respect for the territorial integrity of all nations, states in Europe including Ukraine and of course we have to combine dialogue with credible deterrence. And that is a lesson we learned actually during the Cold War and a lesson which taught us that it’s possible to have dialogue but at the same time have a firm, predictable approach including credible deterrence. This worked towards the Soviet Union during the Cold War and I’m absolutely certain that this strategy is also the right strategy in approaching Russia in a very different security environment today. So we will continue to deliver credible deterrence, be firm and predictable; but at the same time strive for a more constructive relationship with Russia.

 Negative Ground

While at first glance, this topic may look daunting for the negative; a closer examination

allows teams a diverse set of strategy options encompassing both policy and kritikal

argumentation.  Regardless of stylistic norms within all debate circuits, this resolution will allow

students, at all levels, the ability to easily access both literature and arguments for this

resolution.  As the community moves towards “case lists” for novices, the unique nature of this

resolution for case areas allows students to develop a broad range of debate skills and knowledge

making them life-long learners.

65

Page 67: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The harm areas create broad emphasis for case debate at almost all levels.  The impact

areas allow both offensive and defensive arguments to be researched and advocated by the

negative as part of a broader in-round strategy.  More importantly, there should be a strong set of

arguments as to the ability of NATO to resolve the specific cyber threats involving the U.S.  A

robust case debate engaging both the harms’ areas and solvency can be accessed and made by

teams.  In addition, a discussion of the Biden administration and the U.S. government's ongoing

response to cyber threats can be argued. A powerful literature base exists to support arguments

related to the effectiveness of the U.S.’s current cyber strategy.

Because of the diversity of harms areas, the negative gains access to a various set of case

specific disadvantage links related to arguments concerning the foreign relations and the

outcome of policy changes, the effect of these policies on specific industries and the economy,

and arguments relating to the political nature of the changes affirmatives will be discussing. 

There is a significant assortment of case specific disadvantages, as well as politics arguments.

In addition to the disadvantage ground, negatives have a range of counterplan options

with these topics, all supported by robust literature.  Affirmatives must carefully choose their

solvency evidence as literature supports a number of negative counterplan approaches testing the

efficacy of the affirmatives plan.  Key negative ground will include a discussion of which actor

is right to resolve the central concerns being discussed.  Negatives can retrieve evidence to

support arguments of the U.S., as a solitary actor, would be better suited to solve the harms. 

Other international organizations are better equipped, through their membership and structure, to

resolve the concerns, or that public/private partnerships involving non-state actors (technology

companies and business) and government would be most appropriate.  Probably the States CP,

for this topic, is not an option. For the kritik debater, access to the literature examining the

66

Page 68: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

underlying epistemological and ontological realities, will be an asset to debating the topic.   The

authors believe of the importance that teams have access to specific links to a diverse set of

kritikal argumentation lending itself to check the breadth of affirmative argumentation.  Kritikal

teams should have ingress to links to critical arguments including: Anti-Blackness, Queer

Theory, Bio-power, Capitalism, International Relations Theory and Security Studies, Post

Modernism, Communication Theory, and Surveillance.

As the consequences of the recent Solar Winds hack become more apparent, the private

and government sectors of the world are faced with creating an effective cyber strategy to

combat looming challenges involving hybrid warfare. In the 21st century, it becomes crucial to

consider the most effective global actors who can resolve the issue of these emerging threats. 

While the United States’ role in this pressing crisis is debatable, what is not in question is the

need of the international community to collaborate in creating solutions suitable to the complex

cyberspace environment.  As the U.S. and Russia continue playing a cat and mouse diplomacy

game, Putin tries to adjust to the Biden administration’s sanctions related to cyber-attacks.

However, NATO continues to press forward to coordinate and build a global cybersecurity

framework to protect private and public sectors from the dangers of the ongoing low-intensity

cyber war being fought on our global networks every day.

VII. Quality

In President Biden’s 100-day address, he articulates “crisis and opportunity,” or as Sir

Winston Churchill is noted to claim, “Never let a good opportunity go to waste.”  Now, with the

recent ongoing NATO deliberations regarding AI, human gene editing, and Colonial Pipeline

and SolarWinds attacks, the U.S. must take these crises and seize the opportunity to forge a

multilateral approach to these threats.  In this address, Biden’s focus is primarily domestic. 

67

Page 69: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

However, the U.S. is facing daunting threats from Russia, China, and others on multiple fronts. 

This topic will continue to be highly discussed with a steady stream of new relevant research. In

an increasingly untenable global world, the next crisis will be like no other with the use of

emerging technologies on the battlefield. This topic will encourage discussions of international

relations, the STEM field, and the role of international organizations in foreign policy. Each of

these areas is vital to an increasingly technology-driven, globalized world. Therefore, it is

imperative that debaters interact with issues centered around both technology and international

policy. Due to the breadth and depth of the concerns outlined in this paper, the authors feel

assured that debates will not become stale. Rather, the argumentation will grow increasingly

nuanced as the season progresses.

VIII. Material

Recent topic selection meetings have made it clear that equity in resources and

opportunity are both important considerations for our coaches and community.  Through the

collection of research and the discussion of this topic, these authors believe there is a plethora of

material discussing emerging technologies, as well as the threats and opportunities they pose to

the world.  Access to topical, relevant, and contemporary commentary and analysis of artificial

intelligence, bio-technology, and cybersecurity is easily attainable for all debaters.  The focus on

NATO and U.S. government policies creates a set of research without the need for expensive

academic databases.  As the world responds to the real threats and opportunities of emerging

technologies, both U.S. and global experts are weighing in daily creating an enormous database

of evidence.  

These authors are confident this topic will enable students to access quality research and

analysis by global experts, which allows them to cross over into multiple disciplines and

68

Page 70: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

curricula creating life-long learners. Students in Urban Debate Leagues, rural, and small school

communities, as well as the “National Circuit,” can debate at all levels. Students will be able to

engage in discussion of international relations from a perspective other than the U.S.; the topic

allows students to explore the latest trends in science and technology, information that is often

not found in other classes. Debates on this topic will not be limited to certain policy perspectives,

but should allow and foster properly scaffolded skills’ development to enhance argumentation. 

While we feel that the topic is broad, the strength in it is the balance of affirmative and negative

material. 

An exploration of kritikal literature expands well beyond security studies and

International Relations (IR) Theory.  Students will have the opportunity to work with coaches to

explore multiple genres of kritikal literature including Critical Race Studies, Queer Theory,

Colonialism, Post-modernism, Communication Theories, and Economics.  Thanks to the

expanded availability of free access to online academic research, and through the efforts of file

sharing, debaters can find many alternative perspectives. 

IX. Balance

This topic proposal was crafted with meticulous attention to the need for a robust

exchange of ideas. The topic of emerging technologies generally, and the resolutions the authors

have proposed specifically, do not inherently advantage either the affirmative or the negative. As

outlined in this paper, there is an ample research base for both sides to create their arguments –

from the utility of NATO or another entity as the agent of action; to the specific use cases of

artificial intelligence, biotechnology, and cybersecurity technologies; to a vast range of

advantages and disadvantages in light of the important international affairs, security, economic,

and scientific-technological issues implicated in this topic.

69

Page 71: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

To be sure, each of the emerging technologies mentioned in the proposed resolutions

involve complex issues of public policy, technological development, and global security.

Debaters will come away from this experience with a well-rounded understanding of how these

technologies are reshaping society, the advantages and disadvantages of different policy

approaches to addressing the challenges and seizing the opportunities these technologies present,

and how the issues surrounding emerging technologies will shape the global security agenda for

decades to come.  Students will gain knowledge of how crisis and opportunity must be met with

a collaborative approach to the solution.

X. Interest

There is a natural fascination with developments of new technology. The integration of

emerging technology in popular culture goes beyond its use in film and television, though. The

evolution of artificial intelligence, biotechnology, and cybersecurity ripples through multiple

industries which creates an increased interest in these technologies for the layperson. Artificial

intelligence may seem like science fiction to a non-technical crowd, but it is finding greater

relevance yearly. The ubiquity of Amazon Alexa and smart home devices prove the topical

nature of artificial intelligence’s role in most Americans’ lives. Yet, not as many may be aware

of the real threats posed by AI’s use in military operations. Rural communities know well the

impact of biotechnology on the expansion of agricultural products to enhance yield. As

technology progresses, there could be threats to crops from groups bent on disrupting the

American system of agriculture using a synthesized biological weapon. Millions know the

importance of cybersecurity as the transition to electronic information forces our sensitive

personal information onto online databases. Will the next hack involve your bank information,

your social security number, or perhaps your medical records? Of even greater concern to many

70

Page 72: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Americans is the security of our critical infrastructure. If hackers are able to compromise the

power grid, water treatment facilities, or satellite communications, our country could be brought

to the brink of collapse. Emerging technologies and their dual-use require the delicate balance

between policies which allow for innovation and those that regulate misuse. Students, judges,

and community members will have much to learn during a round and possibly even more to

discuss with one another after rounds have concluded.

XI.  Possible Affirmative Cases and Negative Positions

Aff Cases

Regulate/Ban Autonomous WeaponsAI for International Supply Chains/LogisticsNATO Emerging Tech Investment FundAI Oversight BodyRegulate Facial Recognition Vaccine DiplomacyAgricultural Biotechnology CooperationLimit DNA DatabasesRegulate CRISPRInvestment in BiofuelsCritical Cybersecurity InfrastructureLayered Cyber DeterrenceDefend Forward Cyber StrategyStrengthen norms and non-military cyber toolsCreate a “Cyber State of Distress” and cyber response and recovery fund Military Cyber Mission ForceDeterrence First Cyber StrategyName and Shame Cyber DeterrenceEnd Offensive Cyber Operations (OCO’s)International Legal Frameworks for Cyberspace - Military & Non- Military NATO Cyberspace Operations Center CooperationNATO Industry Cyber Partnerships

Neg Positions

UN CounterplanAI Partnership for Defense CounterplanBilateral Counterplans (i.e. Cooperate with China)Unilateral Counterplan (i.e. USFG as sole agent of action)

71

Page 73: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Private Sector CounterplansPublic/Private Partnership CounterplanMultipolarity BadNATO BadInnovation TurnsChina BacklashTechnology Arms RaceHegemony BadOffensive Cyber Operations GoodCyber Deterrence BadMilitary PICTech Industry Econ DATech Innovation DATransnational Crime DA

72

Page 74: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

XII.  References

Allison, G. & Schmidt, E. (2020, August). Is China beating the U.S. to AI supremacy? Retrieved

from https://www.belfercenter.org/publication/china-beating-us-ai-supremacy 

American Society of Mechanical Engineers. (2020, October 19). National Security Commission

on artificial intelligence (NSCAI) releases 2020 interim report and recommendations.

Retrieved from https://www.asme.org/government-relations/capitol-update/national-

security-commission-on-artificial-intelligence-releases-2020-interim-report-and-

recommendations

Barnett, J. (2020, April 24). Why the Pentagon can’t go it alone on AI. Retrieved from

https://www.fedscoop.com/experts-urge-us-nato-not-to-go-it-alone-on-developing-

artificial-intelligence/ 

Berlatsky, N. (2018, December 06). Is AI dangerous? Why our fears of killer computers or

sentient 'Westworld' robots are overblown. Retrieved from

https://www.nbcnews.com/think/opinion/ai-dangerous-why-our-fears-killer-computers-

or-sentient-westworld-ncna943111 

Borghard, E. D. (2020, December 09). Emerging technology and a reimagined U.S.-EU

partnership. Retrieved from https://www.cfr.org/blog/emerging-technology-and-

reimagined-us-eu-partnership

Castellanos, S. (2020, November 02). AI, quantum R&D funding to remain a priority under

Biden. Retrieved from www.wsj.com/articles/ai-quantum-r-d-funding-to-remain-a-

priority-under-biden-11604944800   

73

Page 75: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Choi, E. C. (2019, December 17). Will algorithms make safe decisions in foreign affairs?

Retrieved from https://www.diplomacy.edu/blog/will-algorithms-make-safe-decisions-

foreign-affairs 

Christie, E. H. (2020, November 24). Artificial Intelligence at NATO: dynamic adoption,

responsible use. Retrieved from

https://www.nato.int/docu/review/articles/2020/11/24/artificial-intelligence-at-nato-

dynamic-adoption-responsible-use/index.html

Cicarelli, M. B. (2021, January 13). NATO's Financing Gap. Retrieved from

https://www.americanprogress.org/issues/security/reports/2021/01/13/494605/natos-

financing-gap/ 

Clinton, W. J. (2000, March 09). Full text of Clinton’s speech on China trade bill. Retrieved

from

https://www.iatp.org/sites/default/files/Full_Text_of_Clintons_Speech_on_China_Trade_

Bi.htm 

The collection edge: Harnessing emerging technologies for intelligence collection. (2020, July

13). Retrieved from https://www.csis.org/analysis/collection-edge-harnessing-emerging-

technologies-intelligence-collection?

gclid=Cj0KCQiAvP6ABhCjARIsAH37rbTnOphDY0r6LlhaXyHYI9bbuQUF3vKVa-

NRS_xQantBhjfPJiiDSNQaAuAlEALw_wcB 

Congressional Research Service. (2020, November 10). Artificial intelligence and national

security. Retrieved from https://fas.org/sgp/crs/natsec/R45178.pdf 

Copeland, B. J. (n.d.). Artificial intelligence. Retrieved from

https://www.britannica.com/technology/artificial-intelligence 

74

Page 76: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Cyber defence: Reports. (n.d.). Retrieved from https://natolibguides.info/cybersecurity/reports 

Department of Homeland Security. (n.d.). Science and technology: International partnerships

Retrieved from https://www.dhs.gov/science-and-technology/st-icpo 

DIGITALEUROPE Director General to advise NATO on emerging technologies. (2020, July 8).

Retrieved from https://www.digitaleurope.org/news/digitaleurope-director-general-to-

advise-nato-on-emerging-technologies/ 

Ellehuus, R. Morcos, P. “‘Lifting Up Our Values at Home’: How to Revitalize NATO’s Political Cohesion,” Center for Strategic and International Studies, March 12, 2021, accessed online June 18, 2021. https://www.csis.org/analysis/lifting-our-values-home-how-revitalize-natos-political-cohesion 

Emerging technologies and national security. (2020, December 31). American Foreign Policy

Council. Retrieved from https://www.afpc.org/publications/e-journals/emerging-

technologies-and-national-security 

Emerging technologies and national security: Russia, NATO, & the European theater. (2019,

February 25). Retrieved from https://www.hoover.org/research/emerging-technologies-

and-national-security-russia-nato-european-theater 

Emerging technology definition must protect American innovation (n.d.) National Venture

Capital Association. Retrieved from https://nvca.org/pressreleases/emerging-technology-

definition-must-protect-american-innovation/

Engstrom, D. F. et al. (2020, February). Government by algorithm: Artificial intelligence in

federal administrative agencies. Retrieved from

https://www.ospi.es/export/sites/ospi/documents/documentos/Tecnologias-habilitantes/

US_ACUS_Gov-by-Algorithm-report.pdf 

75

Page 77: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Erlanger, S. (2020, November 30). NATO needs to adapt quickly to stay relevant for 2030,

report urges. Retrieved from https://www.nytimes.com/2020/11/30/world/europe/nato-

2030-russia-china.html 

Erlanger, S., & Michael. (2021, June 14). Shifting Focus, NATO Views China as a Global

Security Challenge. Retrieved from https://www.nytimes.com/2021/06/14/world/europe/biden-

nato-china-russia.html

European defence & transatlantic security cooperation. (2019, June 12). Retrieved from

https://www.gmfus.org/events/european-defence-transatlantic-security-cooperation 

Fishman, E. & Simakovsky M. (2021, March 05). A three-step plan for reviving the transatlantic

alliance. Retrieved from http://www.atlanticcouncil.org/blogs/new-atlanticist/a-three-

step-plan-for-reviving-the-transatlantic-alliance/. 

Ford, C. A. (2020, April 20). Al, human-machine interaction, and autonomous weapons:

Thinking carefully about taking "killer robots" seriously. Retrieved from

https://www.state.gov/wp-content/uploads/2020/06/T-Paper-Series-2-LAWS-FINAL-

508.pdf 

Ford, L. W., & Goldgeier, J. (2021, January 25). Retooling America's alliances to manage the

China challenge. Retrieved from https://www.brookings.edu/research/retooling-americas-

alliances-to-manage-the-china-challenge/ 

Fried, I. (2021, March 02). China will dominate AI unless U.S. invests more, commission warns.

Retrieved from https://www.axios.com/china-will-dominate-ai-unless-us-invests-more-

commission-warns-addaee06-cc72-4c46-98ad-2962c5f919e0.html

The future of NATO. (2020, August 10). Retrieved from https://www.iai.it/en/eventi/future-nato 

76

Page 78: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The future of warfare and the role of new and emerging technologies: Recap. (2021, February

23). Retrieved from https://www.globsec.org/news/11341/ 

Galatas, I. (2017). The misuse and malicious uses of the new biotechnologies. Annales des

Mines - Réalités industrielles, 1(1), 103-108. https://doi.org/10.3917/rindu1.171.0103 

Gill, I. (2020, January 31). Whoever leads in artificial intelligence in 2030 will rule the world

until 2100. Retrieved from https://www.brookings.edu/blog/future-

development/2020/01/17/whoever-leads-in-artificial-intelligence-in-2030-will-rule-the-

world-until-2100/

Global Futures Intelligence System. (n.d.). Retrieved from

http://www.millennium-project.org/projects/global-futures-intelligence-system/?

gclid=Cj0KCQiAvP6ABhCjARIsAH37rbT9fdD3kOoY1jLgaQnJlsie8R3OwSpLdzg8Sf3

IcSwJLvrnTOhsy6UaAty2EALw_wcB 

Gordon, M. R., & Marson, J. (2020, December 01). NATO should expand its focus to include

China, report says. Retrieved from https://www.wsj.com/articles/nato-should-expand-its-

focus-to-include-china-report-says-11606820403  

Gould, J. (2021, February 23). After SolarWinds, US needs to toughen cyber defenses, says

Microsoft president. Retrieved from http://www.c4isrnet.com/2021/02/23/after-

solarwinds-us-needs-to-toughen-cyber-defenses-says-microsoft-president/ 

Hanke Vela, J., Leali, G. & Moens, B. (2021, January 01). Germany’s drive for EU-China deal

draws criticism from other EU countries. Politico. Retrieved from

https://www.politico.eu/article/germanys-drive-for-eu-china-deal-draws-criticism-from-

other-eu-countries/ 

77

Page 79: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Hao, K. (2021, January 22). The Biden administration’s AI plans: what we might expect.

Technology Review,  Retrieved from 

https://www.technologyreview.com/2021/01/22/1016652/biden-administration-ai-plans-

what-to-expect/ 

Hass, R. & Balin, Z. (2019, January 10). US-China relations in the age of artificial intelligence.

Retrieved from https://www.brookings.edu/research/us-china-relations-in-the-age-of-

artificial-intelligence/ 

Heikkila, M. (2021, March 29). NATO wants to set AI standards. If only its members agreed on

the basics. Retrieved from https://www.politico.eu/article/nato-ai-artificial-intelligence-

standards-priorities/ 

Hill, S. (2020, April 27). AI's impact on multilateral military cooperation: Experience from

NATO. Retrieved from https://www.cambridge.org/core/journals/american-journal-of-

international-law/article/ais-impact-on-multilateral-military-cooperation-experience-

from-nato/3AEF22AA22550A10B75DD74A806D4D18 

IBM. (n.d.) Artificial intelligence (AI). Retrieved from https://www.ibm.com/cloud/learn/what-

is-artificial-intelligence 

Kamarck, E. (2018, November 29). Malevolent soft power, AI, and the threat to democracy.

Retrieved from https://www.brookings.edu/research/malevolent-soft-power-ai-and-the-

threat-to-democracy/ 

Kasapoglu, C. & Kirdemir, B. (2019, November 28). Artificial intelligence and the future of

conflict. Retrieved from https://carnegieeurope.eu/2019/11/28/artificial-intelligence-and-

future-of-conflict-pub-80421 

78

Page 80: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Key takeaways from the launch of e-volume on cyber threats and NATO 2030. (n.d.). The NATO

Cooperative Cyber Defence Centre of Excellence. Retrieved from

https://ccdcoe.org/news/2021/key-takeaways-from-the-launch-of-e-volume-on-cyber-

threats-and-nato-2030/ 

Koblentz, G. D. (2020, June 16). Emerging technologies and the future of CBRN terrorism. The

Washington Quarterly, 43(2), 177-196, Retrieved from

https://www.tandfonline.com/doi/abs/10.1080/0163660X.2020.1770969?

journalCode=rwaq20 

Kosal, M. E. (2020, January 13). NATO and emerging technologies. Retrieved from

https://www.europeanleadershipnetwork.org/commentary/nato-and-emerging-

technologies/ 

Kurup, V. M., & Thomas, J. (2020). Edible vaccines: Promises and challenges. Molecular

biotechnology, 62(2), 79–90. https://doi.org/10.1007/s12033-019-00222-1 

Lawrence, C. & Cordey, S. (2020, August). The case for increased transatlantic cooperation on

artificial intelligence. Retrieved from https://www.belfercenter.org/publication/case-

increased-transatlantic-cooperation-artificial-intelligence

Ledford, H. (2020, January 06). Quest to use CRISPR against disease gains ground. Retrieved

from https://www.nature.com/articles/d41586-019-03919-0 

Lee, M. (2021, March 03). Biden brings no relief to tensions between US and China. Retrieved

from https://apnews.com/article/joe-biden-donald-trump-biden-cabinet-beijing-

coronavirus-pandemic-060ee406fe2e488e524552c43083ddad 

Leopold, G. (2020, November 02). NATO targets AI interoperability. Retrieved from

https://www.enterpriseai.news/2020/11/02/nato-targets-ai-interoperability/ 

79

Page 81: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Lepido, D.  (2021, March 23). Swiss Cyber Security Firm Says It Accessed Servers of a

SolarWinds Hacking Group. Insurance Journal, Retrieved from

https://www.insurancejournal.com/news/international/2021/03/23/606548.htm#:~:text=A

%20Swiss%20cyber%2Dsecurity%20firm,their%20campaign%20through%20this

%20month

LeVine, S. (2018, March 21). The stakes for who wins the AI race. Retrieved from

https://www.axios.com/the-stakes-for-who-wins-the-ai-race-0363d9cd-0d97-4a5a-9ee6-

36a7fb03ff44.html 

Lin-Greenberg, E. (2020, March). Allies and artificial intelligence: Obstacles to operations and

decision-making. Retrieved from https://tnsr.org/2020/03/allies-and-artificial-

intelligence-obstacles-to-operations-and-decision-making/ 

Lomas, N. (2020, December 02). Europe will push to work with the US on tech governance,

post-Trump. Retrieved from https://techcrunch.com/2020/12/02/europe-will-push-to-

work-with-the-us-on-tech-governance-post-trump/ 

Mattox, G. (2020, February 27) The future of transatlantic security cooperation: Past successes

and emerging threats. American Institute for Contemporary German Studies. Retrieved

from https://www.aicgs.org/2020/02/the-future-of-transatlantic-security-cooperation-

past-successes-and-emerging-threats/ 

Morcos, P. (2020, December 3). NATO in 2030: Charting a new path for the transatlantic

alliance. Center for Strategic & International Studies. Retrieved from

https://www.csis.org/analysis/nato-2030-charting-new-path-transatlantic-alliance

Markotkin, N. & Chernenko, E. (2020, August 05). Developing artificial intelligence in Russia:

Objectives and reality. Retrieved from https://carnegie.ru/commentary/82422 

80

Page 82: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Martinez, D. et al. (2019, January). Artificial intelligence: Short history, present developments,

and future outlook. Retrieved from

https://www.ll.mit.edu/sites/default/files/publication/doc/2019-09/Artificial

%20Intelligence%20Short%20History%2C%20Present%20Developments%2C%20and

%20Future%20Outlook%20-%20Final%20Report%20-%20Martinez.pdf 

Metz, C. (2019, February 11). Trump signs executive order promoting artificial intelligence.

Retrieved from https://www.nytimes.com/2019/02/11/business/ai-artificial-intelligence-

trump.html 

Moore, S. (2020, April). China’s role in the global biotechnology sector and implications for US

policy. Brookings Institute. Retrieved from

https://www.brookings.edu/wp-content/uploads/2020/04/FP_20200427_china_biotechnol

ogy_moore.pdf 

Moore, S. (2021, February 17). In biotech, the industry of the future, the U.S. is way ahead of

China.” Lawfare, Retrieved from www.lawfareblog.com/biotech-industry-future-us-way-

ahead-china. 

Murphy, C., Stebbing, E. F., Pascal Kalume Kambale and Mvemba Phezo Dizolele, Takeyh, R.,

Segal, A., Wodu, N., . . . Editors, C. (2020, April 21). How to Understand Technology

and Geopolitics. Retrieved from https://www.foreignaffairs.com/lists/2019-10-07/how-

understand-technology-and-geopolitics 

Murray, R. (2020, September 01). Building a resilient innovation pipeline for the alliance.

Retrieved from https://www.nato.int/docu/review/articles/2020/09/01/building-a-

resilient-innovation-pipeline-for-the-alliance/index.html 

 

81

Page 83: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

The National Intelligence Research and Development Strategic Plan: 2019 Update. (2019, June). 

Select Committee of Artificial Intelligence of the National Science & Technology

Council, June 2019.   https://www.nitrd.gov/pubs/National-AI-RD-Strategy-2019.pdf

NATO technology innovation conference is coming to Prague. (2020, February 11). Retrieved

from https://spendmatters.com/uk/nato-innovation-conference-comes-to-prague/ 

NATO ACT. (n.d.). Retrieved from https://adlnet.gov/partnership-network/nato-allied-

command-transformation-act-adl/ 

NATO. November 16, 2020.  (n.d.), NATO readies for cyber threats.

        www.nato.int/cps/en/natohq/news_179481.htm?selectedLocale=en. 

NATO and Europe in the 21st century: New roles for a changing partnership. (n.d.). Retrieved

from https://www.wilsoncenter.org/publication/nato-and-europe-the-21st-century-new-

roles-for-changing-partnership 

North Atlantic Treaty Organization. (n.d.). Retrieved from https://www.rand.org/topics/north-

atlantic-treaty-organization.html 

Partnership for technology in peacekeeping (n.d.). United Nations. Retrieved from

https://operationalsupport.un.org/en/partnership-technology-peacekeeping 

Paun, C., & Heath, R. (2020, July 24). How the coronavirus can prepare us for bioterrorism.

Retrieved from https://www.politico.com/news/2020/07/24/how-to-prepare-for-

bioterrorism-courtesy-of-coronavirus-380689 

Pepe, E. (2020, November 13). NATO and collective thinking on AI. Retrieved from 

https://www.iiss.org/blogs/military-balance/2020/11/nato-artificial-intelligence

Pomerleau, M., & Eversden, A. (2020, March 11). Congressional report outlines new American

cyber strategy. Retrieved from

82

Page 84: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

https://www.fifthdomain.com/congress/2020/03/11/congressional-report-outlines-new-

american-cyber-strategy/

Prasad, K. (2021, April 05). Commentary: Unless the U.S. changes its vaccine policy, the world

will look at us like hoarders. Retrieved from https://fortune.com/2021/04/04/us-vaccine-

hoarding-nationalism-diplomacy-china-russia-india/ 

Remarks by President Biden at the 2021 Virtual Munich Security Conference. (2021, February 

19). Retrieved from http://www.whitehouse.gov/briefing-room/speeches-remarks/2021/02/19/

remarks-by-president-biden-at-the-2021-virtual-munich-security-conference/ 

Report. (n.d.). Retrieved from https://www.solarium.gov/report

Reynolds, J. & Lightfoot, J.. (2020, October 14). Digitalize the enterprise. Retrieved from

https://www.atlanticcouncil.org/content-series/nato20-2020/digitalize-the-enterprise/ 

Richardson, L. C. et al. (2019, Jun 6). Cyberbiosecurity: A call for cooperation in a new threat

landscape. Frontiers in Bioengineering and Biotechnology 7(99),

doi:10.3389/fbioe.2019.00099 

Riley, T. (2021, Match 26). Analysis | The Cybersecurity 202: NSA Director Says Intelligence 

Has a Big Blind Spot: Domestic Internet Activity. The Washington Post, Retrieved from 

www.washingtonpost.com/politics/2021/03/26/cybersecurity-202-nsa-director-says-intelli

gence-has-big-blind-spot-domestic-internet-activity/#click=t.co/kg8XkfRoXH. 

Sanger, D. E., Erlanger, S., & Cohen, R. (2021, February 20). Biden Tells Allies 'America Is

Back,' but Macron and Merkel Push Back. Retrieved from

https://www.nytimes.com/2021/02/19/us/politics/biden-munich-conference.html 

83

Page 85: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Sanger, D. E. & Kramer, A. E. (2021, April 16). U.S. imposes stiff sanctions on Russia, blaming

it for major hacking operation. New York Times. Retrieved from

http://www.nytimes.com/2021/04/15/world/europe/us-russia-sanctions.html 

Schwartz, O. (2018, July 25). 'The discourse is unhinged': how the media gets AI alarmingly

wrong. The Guardian. Retrieved from

https://www.theguardian.com/technology/2018/jul/25/ai-artificial-intelligence-social-

media-bots-wrong

Select committee on artificial intelligence of the National Science & Technology Council. (2019,

June). Retrieved from https://www.nitrd.gov/pubs/National-AI-RD-Strategy-2019.p

Shalal, A. (2018, November 13). NATO looks to startups, disruptive tech to conquer emerging

threats. Retrieved from https://www.reuters.com/article/us-nato-innovation/nato-looks-to-

startups-disruptive-tech-to-conquer-emerging-threats-idUSKCN1NI2NW 

Sharper: America's alliances and partnerships. (n.d.). Retrieved from

https://www.cnas.org/publications/commentary/sharper-americas-alliances-and-

partnerships 

Shea, J. and Williams, M. The secret to NATO's survival: Get political. (2021, June 17).

Retrieved from https://www.atlanticcouncil.org/blogs/new-atlanticist/the-secret-to-natos-

survival-get-political/

Shead, S. (2021, March 02). U.S. is ‘not prepared to defend or compete in the A.I. era,’ says

expert group chaired by Eric Schmidt. CNBC. Retrieved from

https://www.cnbc.com/2021/03/02/us-not-prepared-to-defend-or-compete-in-ai-era-says-

eric-schmidt-group.html

84

Page 86: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Sherman, J. & Hu, E. (2021, February 19). How the next National Defense Strategy can get

serious about emerging technologies. Atlantic Council, Retrieved from

www.atlanticcouncil.org/blogs/new-atlanticist/how-the-next-national-defense-strategy-

can-get-serious-about-emerging-technologies/. 

Should we fear artificial intelligence? (2018, March). Retrieved from

https://www.europarl.europa.eu/RegData/etudes/IDAN/2018/614547/EPRS_IDA(2018)6

14547_EN.pdf 

Soare, S. R. (2020, March). Digital divide? Transatlantic defence cooperation on Artificial

Intelligence. Retrieved from

https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%203%20AI_0.pdf

Speranza, L. (2020, November 9). An agenda for NATO's next generation. Retrieved from

https://cepa.org/an-agenda-for-natos-next-generation/ 

Speranza, L., & Nelson, N. (2020, December 08). NATO needs a strategy for emerging and

disruptive technologies. Retrieved from

https://www.defensenews.com/opinion/2020/12/08/nato-needs-a-strategy-for-emerging-

and-disruptive-technologies/ 

Stavridis, J. (2019, April 04). Why NATO is essential for world peace, according to its former

commander. Retrieved from https://time.com/5564171/why-nato-is-essential-world-

peace/ 

Straub, J. (2018, January 29). Artificial intelligence is the weapon of the next Cold War.

Retrieved from https://theconversation.com/artificial-intelligence-is-the-weapon-of-the-

next-cold-war-86086

85

Page 87: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Swejis, T. & Osinga, F. (2020, April 04). Maintaining NATO's technological edge. Retrieved

from https://www.tandfonline.com/doi/abs/10.1080/02681307.2019.1731216?

scroll=top&needAccess=true&journalCode=rwhi20 

Tadjdeh, Y. (2020, March 03). DoD seeks AI alliance to counter China, Russia. Retrieved from

https://www.nationaldefensemagazine.org/articles/2020/3/3/algorithmic-warfare-dod-

seeks-ai-alliance-to-counter-china-russia

Tellier, K. (2021, March 29). March 29, 2021: Reading  notes: Ryan Hass's 'competitive

interdependence'. Retrieved from https://kevtellier.substack.com/p/march-29-2021-

reading-notes-ryan 

Tucker, P. (2021, June 22). NATO Members Agree to Broad Tech, Environmental Agenda.

Retrieved from https://www.defenseone.com/threats/2021/06/nato-members-agree-broad-

tech-agenda-environmental-agenda/174767/

U.S. body on artificial intelligence calls for creating India-US strategic tech alliance. (2020,

October 14). Retrieved from https://economictimes.indiatimes.com/news/defence/us-body-on-

artificial-intelligence-calls-for-creating-india-us-strategic-tech-alliance/articleshow/

78659333.cms?from=mdr 

U.S. security cooperation with Finland. (2021, January 20). United States Department of State

Retrieved from https://www.state.gov/u-s-security-cooperation-with-finland/ 

Ventura, T. (2021, January 10). How NATO's emerging culture of innovation is reshaping the

alliance. Retrieved from https://medium.com/predict/how-natos-emerging-culture-of-

innovation-is-reshaping-the-alliance-1b7f8023f393

86

Page 88: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Verma, A. S., Agrahari, S., Rastogi, S., & Singh, A. (2011). Biotechnology in the realm of

history. Journal of pharmacy & bioallied sciences, 3(3), 321–323.

https://doi.org/10.4103/0975-7406.84430 

Vogel, K. M., & Ouagrham-Gormley, S. B. (2018). Anticipating emerging biotechnology

threats: A case study of CRISPR. Politics and the Life Sciences, 37(2), 203-219.

https://doi.org/10.1017/pls.2018.21 

Walla, K. et al. (2020, October 29). The transatlantic alliance needs to work together to gain

technological edge. Atlantic Council. Retrieved from

https://www.atlanticcouncil.org/blogs/new-atlanticist/the-transatlantic-alliance-needs-to-

work-together-to-gain-technological-edge/

Webinar: How do emergent and disruptive technologies shape the security agenda in the South?

(n.d.). Retrieved from https://thesouthernhub.org/activities/webinar-how-do-emergent-

and-disruptive-technologies-shape-the-security-agenda-in-the-south 

Weiss, S. (April 2016) “Harnessing biotechnology: A practical guide.” Chemical Engineering.

Retrieved from https://www.genomatica.com/wp-content/uploads/2017/01/Harnessing-

Biotechnology-A-Practical-Guide.pdf 

West, R. M., & Gronvall, G. K. (2020). CRISPR cautions: Biosecurity implications of gene

editing. Perspectives in Biology and Medicine, 63(1), 73-92.

doi:10.1353/pbm.2020.0006 

Wiggers, K. (2020, November 06). How AI predictions fared against pollsters in the 2020 U.S.

election. Retrieved from https://venturebeat.com/2020/11/06/how-ai-predictions-fared-

against-pollsters-in-the-2020-u-s-election/ 

Wright, N. (2018, July 10). How artificial intelligence will reshape the global order. 

87

Page 89: old.nfhs.orgold.nfhs.org/media/4717019/nfhsemergtechfinal62421.docx · Web view), everyone is excited for the next crisis facing this enigmatic character and Q’s new gadgets to

Retrieved from https://www.foreignaffairs.com/articles/world/2018-07-10/how-artificial-

intelligence-will-reshape-global-order?

utm_medium=email_notifications&utm_source=reg_confirmation&utm_campaign=reg_

guestpass 

Zandee, D. (n.d.) The future of NATO: Strategic monitor 2018-2019. Clingendael. Retrieved

from https://www.clingendael.org/pub/2018/strategic-monitor-2018-2019/the-future-of-

nato/ 

88